scholarly journals Video Conference Software Inplementation Based on Data Encryption Using Elliptic Curves

2021 ◽  
Vol 2131 (3) ◽  
pp. 032112
Author(s):  
Olga Safaryan ◽  
Larissa Cherckesova ◽  
Nikolay Boldyrikhin ◽  
Irina Pilipenko ◽  
Tatyana Nikishina ◽  
...  

Abstract Article is devoted to the development of free program services for video conferencing. Proposed system eliminates security flaws found in other developments. Analysis of security model development using elliptic curves and secret key transfer using Diffie–Hellman algorithm is carried out. Currently, video communication software is used everywhere. Main task of such software applications is help to people communicate with colleagues, relatives and friends at great distances. However, it is very important that their conversation remains confidential, otherwise any information said can get to third parties, and then – cost of leaking personal information can change from damage done to one person to damage done to entire states. Therefore, it is so important to use only software products that have passed certification process when communicating where information with limited access will be used. Software tool has been developed that allows creating secure video conferences with ECIES encryption algorithm on elliptic curves, which allows holding conferences without fear of being compromised. Thus, proposed application significantly increases users security, their personal data, as well as confidentiality of their conversations. Developed software product can be used to conduct secure video conference.

2020 ◽  
Vol 62 (5-6) ◽  
pp. 287-293
Author(s):  
Felix Günther

AbstractSecure connections are at the heart of today’s Internet infrastructure, protecting the confidentiality, authenticity, and integrity of communication. Achieving these security goals is the responsibility of cryptographic schemes, more specifically two main building blocks of secure connections. First, a key exchange protocol is run to establish a shared secret key between two parties over a, potentially, insecure connection. Then, a secure channel protocol uses that shared key to securely transport the actual data to be exchanged. While security notions for classical designs of these components are well-established, recently developed and standardized major Internet security protocols like Google’s QUIC protocol and the Transport Layer Security (TLS) protocol version 1.3 introduce novel features for which supporting security theory is lacking.In my dissertation [20], which this article summarizes, I studied these novel and advanced design aspects, introducing enhanced security models and analyzing the security of deployed protocols. For key exchange protocols, my thesis introduces a new model for multi-stage key exchange to capture that recent designs for secure connections establish several cryptographic keys for various purposes and with differing levels of security. It further introduces a formalism for key confirmation, reflecting a long-established practical design criteria which however was lacking a comprehensive formal treatment so far. For secure channels, my thesis captures the cryptographic subtleties of streaming data transmission through a revised security model and approaches novel concepts to frequently update key material for enhanced security through a multi-key channel notion. These models are then applied to study (and confirm) the security of the QUIC and TLS 1.3 protocol designs.


Sensors ◽  
2021 ◽  
Vol 21 (3) ◽  
pp. 772 ◽  
Author(s):  
Houshyar Honar Pajooh ◽  
Mohammad Rashid ◽  
Fakhrul Alam ◽  
Serge Demidenko

The proliferation of smart devices in the Internet of Things (IoT) networks creates significant security challenges for the communications between such devices. Blockchain is a decentralized and distributed technology that can potentially tackle the security problems within the 5G-enabled IoT networks. This paper proposes a Multi layer Blockchain Security model to protect IoT networks while simplifying the implementation. The concept of clustering is utilized in order to facilitate the multi-layer architecture. The K-unknown clusters are defined within the IoT network by applying techniques that utillize a hybrid Evolutionary Computation Algorithm while using Simulated Annealing and Genetic Algorithms. The chosen cluster heads are responsible for local authentication and authorization. Local private blockchain implementation facilitates communications between the cluster heads and relevant base stations. Such a blockchain enhances credibility assurance and security while also providing a network authentication mechanism. The open-source Hyperledger Fabric Blockchain platform is deployed for the proposed model development. Base stations adopt a global blockchain approach to communicate with each other securely. The simulation results demonstrate that the proposed clustering algorithm performs well when compared to the earlier reported approaches. The proposed lightweight blockchain model is also shown to be better suited to balance network latency and throughput as compared to a traditional global blockchain.


2021 ◽  
Vol 2021 (2) ◽  
pp. 88-110
Author(s):  
Duc Bui ◽  
Kang G. Shin ◽  
Jong-Min Choi ◽  
Junbum Shin

Abstract Privacy policies are documents required by law and regulations that notify users of the collection, use, and sharing of their personal information on services or applications. While the extraction of personal data objects and their usage thereon is one of the fundamental steps in their automated analysis, it remains challenging due to the complex policy statements written in legal (vague) language. Prior work is limited by small/generated datasets and manually created rules. We formulate the extraction of fine-grained personal data phrases and the corresponding data collection or sharing practices as a sequence-labeling problem that can be solved by an entity-recognition model. We create a large dataset with 4.1k sentences (97k tokens) and 2.6k annotated fine-grained data practices from 30 real-world privacy policies to train and evaluate neural networks. We present a fully automated system, called PI-Extract, which accurately extracts privacy practices by a neural model and outperforms, by a large margin, strong rule-based baselines. We conduct a user study on the effects of data practice annotation which highlights and describes the data practices extracted by PI-Extract to help users better understand privacy-policy documents. Our experimental evaluation results show that the annotation significantly improves the users’ reading comprehension of policy texts, as indicated by a 26.6% increase in the average total reading score.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Heather J. Parker ◽  
Stephen Flowerday

Purpose Social media has created a new level of interconnected communication. However, the use of online platforms brings about various ways in which a user’s personal data can be put at risk. This study aims to investigate what drives the disclosure of personal information online and whether an increase in awareness of the value of personal information motivates users to safeguard their information. Design/methodology/approach Fourteen university students participated in a mixed-methods experiment, where responses to Likert-type scale items were combined with responses to interview questions to provide insight into the cost–benefit analysis users conduct when disclosing information online. Findings Overall, the findings indicate that users are able to disregard their concerns due to a resigned and apathetic attitude towards privacy. Furthermore, subjective norms enhanced by fear of missing out (FOMO) further allows users to overlook potential risks to their information in order to avoid social isolation and sanction. Alternatively, an increased awareness of the personal value of information and having experienced a previous privacy violation encourage the protection of information and limited disclosure. Originality/value This study provides insight into privacy and information disclosure on social media in South Africa. To the knowledge of the researchers, this is the first study to include a combination of the theory of planned behaviour and the privacy calculus model, together with the antecedent factors of personal valuation of information, trust in the social media provider, FOMO.


Author(s):  
Sami M. Fawzy ◽  
Tarek M. Esmael ◽  
Hany Hosny ◽  
Abdulmajeed Al Amri ◽  
Khalid Al Malki ◽  
...  

Progress in deciding the opinion of head-teachers on the instructional and logistical characteristics needed for a fundamental cardiopulmonary resuscitation (b-CPR) program for adolescents in secondary school. The purpose of the thesis is to explore the level of educators' preparation to cope with life-threatening circumstances. This paper aims to determine the connection between the score of the instructor to the questions drawn up and their knowledge of BSL. And we have studied the participants' student conduct without any impact on their behaviour. Teachers from chosen primary schools are the partners. There will also be a record of population characteristics. There will be registered personal data and documents. Some of the information involves the compilation of gender, gender, degree of education and weight data using survey questions. A high degree of secrecy would be ensured through this study. In addition, all information from the participants will be collected voluntarily. The educators would be allowed to have an answer to all the questions. The primary aim of the research is to raise awareness of the importance of critical support for life in schools. At the beginning of each academic year, this study is proposed to create a compulsory training session for teachers, and the outcome is gathered using survey questions to produce using personal information and data such as sex, gender, level of education and weight details.


2017 ◽  
Vol 6 (1) ◽  
pp. 1-8
Author(s):  
Jorida Xhafaj ◽  
Almarin Frakulli

The main object of this paper is the tender balance that exists and arises even more between the use of personal information that people provide in the course of most public security actions and privacy. This study analyze the most famous and strong related decision of the European Court of Human Rights, with the aim to give our opinion how has to be understand the barrier between the power of individuals over information and the power of public institutions to guaranties security. The protection of personal data is of fundamental importance to a person’s enjoyment of his or her right to respect for private and family life, and how law allocates power over information in different countries, will give us the possibility to define the most important criteria’s which define the existence of abuse or not over personal data and information.


2019 ◽  
Author(s):  
Vaclav Janecek

This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed around two main approaches shaping all ownership theories: a bottom-up and top-down approach. Via these dual lenses, the article reviews existing debates relating to four elements supporting introduction of ownership of personal data, namely the elements of control, protection, valuation, and allocation of personal data. It then explores the explanatory advantages and disadvantages of the two approaches in relation to each of these elements as well as to ownership of personal data in IoT at large. Lastly, the article outlines a revised approach to ownership of personal data in IoT that may serve as a blueprint for future work in this area and inform regulatory and policy debates.


Author(s):  
Anna Rohunen ◽  
Jouni Markkula

Personal data is increasingly collected with the support of rapidly advancing information and communication technology, which raises privacy concerns among data subjects. In order to address these concerns and offer the full benefits of personal data intensive services to the public, service providers need to understand how to evaluate privacy concerns in evolving service contexts. By analyzing the earlier used privacy concerns evaluation instruments, we can learn how to adapt them to new contexts. In this article, the historical development of the most widely used privacy concerns evaluation instruments is presented and analyzed regarding privacy concerns' dimensions. Privacy concerns' core dimensions, and the types of context dependent dimensions, to be incorporated into evaluation instruments are identified. Following this, recommendations on how to utilize the existing evaluation instruments are given, as well as suggestions for future research dealing with validation and standardization of the instruments.


Sign in / Sign up

Export Citation Format

Share Document