A survey for secure communication of cloud third party authenticator

Author(s):  
Sawan V. Baghel ◽  
Deepti P. Theng
Author(s):  
David Crowe ◽  
Wasim Al-Hamdani

This paper presents a synchronous encryption key management model that does not require the sender to disclose the encryption key in order to effect decryption. This eliminates the need for key exchange mechanisms, giving the sender improved control over their keys. The retained-key model is presented as being a software application that handles the initiation of a secure communication channel between sender and receiver, and facilitates user authentication by a trusted third party—presumably, the software’s vendor. This model is not intended to replace public/private key-based mechanisms, as they serve an important role in message signing and authentication. Rather, it seeks to provide an alternative means of decrypting messages in a secure fashion while allowing the sender to avoid the need to disclose the message’s key.


EP Europace ◽  
2020 ◽  
Vol 22 (11) ◽  
pp. 1742-1758 ◽  
Author(s):  
Jens Cosedis Nielsen ◽  
Josef Kautzner ◽  
Ruben Casado-Arroyo ◽  
Haran Burri ◽  
Stefaan Callens ◽  
...  

Abstract The European Union (EU) General Data Protection Regulation (GDPR) imposes legal responsibilities concerning the collection and processing of personal information from individuals who live in the EU. It has particular implications for the remote monitoring of cardiac implantable electronic devices (CIEDs). This report from a joint Task Force of the European Heart Rhythm Association and the Regulatory Affairs Committee of the European Society of Cardiology (ESC) recommends a common legal interpretation of the GDPR. Manufacturers and hospitals should be designated as joint controllers of the data collected by remote monitoring (depending upon the system architecture) and they should have a mutual contract in place that defines their respective roles; a generic template is proposed. Alternatively, they may be two independent controllers. Self-employed cardiologists also are data controllers. Third-party providers of monitoring platforms may act as data processors. Manufacturers should always collect and process the minimum amount of identifiable data necessary, and wherever feasible have access only to pseudonymized data. Cybersecurity vulnerabilities have been reported concerning the security of transmission of data between a patient’s device and the transceiver, so manufacturers should use secure communication protocols. Patients need to be informed how their remotely monitored data will be handled and used, and their informed consent should be sought before their device is implanted. Review of consent forms in current use revealed great variability in length and content, and sometimes very technical language; therefore, a standard information sheet and generic consent form are proposed. Cardiologists who care for patients with CIEDs that are remotely monitored should be aware of these issues.


2021 ◽  
Vol 2096 (1) ◽  
pp. 012125
Author(s):  
F R Ametov ◽  
E A Bekirov ◽  
M M Asanov

Abstract Modern automated control systems in industrial and private enterprises are represented by a set of programmable logic devices and components from various manufacturers. They operate based on many of the most widely used protocols and interfaces. Some manufacturers have their own solutions that are mainly focused only on their product, without direct or indirect compatibility with third-party solutions. Many control systems used now operate on relatively old solutions that cannot be partially modernized due to lack of technical resources or financial unprofitability. The paper considers the most popular industrial protocols Modbus and Profibus, analyzes their advantages, as well as features of the structure and functionality. The study of the operation problems and information security of modern control systems is considered, solutions for their elimination are analyzed. A solution for the control systems modernization was proposed based on the analysis. It can become effective and financially justified due to its technical features, allowing it to be adapted to existing solutions. Conclusions about the effectiveness of the proposed solution were formulated based on the data collected and the goals achieved.


Author(s):  
Kevin Curran ◽  
Sheila McCarthy

E-mail has been one of the major reasons for the broad acceptance of the Internet, and although e-mail is still a vitally important communication tool, it suffers from an increasing number of problems as a medium for delivering information to the correct audience in a timely manner. The increasing volume of spam and viruses means that e-mail users are forced into adopting new tools, such as spam-blocking and e-mail-filtering software, that attempt to prevent the tirade of unwanted e-mails. Many users are also becoming increasingly reticent to divulge their e-mail address for fear of an impending spam influx. Further to this, recent studies suggest that up to 38% of bona fide e-mail messages are being erroneously blocked by filtering software. In reality, this means that more than a third of e-mails, newsletters, special offers, and event announcements are not reaching their intended audience (Patch & McKinlay-Key, 2004). Therefore, the combination of e-mail issues, such as the increasing difficulties associated with multimedia downloads, such as delays, compression, and data integrity maintenance, could be seen as creating a demand for an alternate, effective, and secure communication methodology. One such alternative technology is Really Simple Syndication (RSS), previously known as Rich Site Summary. RSS allows some elements of Web sites, such as headlines, to be transmitted in unembellished form. When devoid of all elaborate graphics and layouts, such minimalist headlines are quite easily incorporated into other Web sites. In other words, third-party Web sites can insert this content on their site through embedded RSS news readers and thus, provide active news feeds quite easily to their clientele. RSS, termed a lightweight content syndication technology, offers many advantages over streaming and e-mail, and for the consumer, no more difficult to access as the RSS readers are akin to e-mail clients (Byrne, 2003). There is no question that the media is keen to adopt a new communications option, and RSS most certainly can comply. RSS solves a myriad of problems Web masters commonly face, such as increasing traffic, and gathering and distributing news (BBC, 2008). RSS can also be the basis for additional content distribution services (Kerner, 2004). The real benefit of RSS, apart from the added benefit of receiving news feeds from multiple sites, simultaneously, in the viewer, is that all the news feeds (i.e., news items) are chosen by the user. With thousands of sites now RSS-enabled and more on the way, RSS has become perhaps one of the most visible Xtensible Mark-up Language (XML) success stories to date. RSS formats are specified using XML, a generic specification for the creation of data formats. Although RSS formats have evolved since March 1999, the RSS icon (“ ”) first gained widespread use in 2005/2006. RSS democratizes news distribution by making everyone a potential news provider. It leverages the Web’s most valuable asset, content, and makes displaying high-quality relevant news on a site relatively easy (King, 2004). It must be recognized, however, that RSS cannot entirely replace the primary function of e-mail, which is to provide person-to-person asynchronous communications, but it does compliment it in some interesting ways.


2019 ◽  
Vol 16 (10) ◽  
pp. 4345-4349
Author(s):  
Latika Kakkar ◽  
Deepali Gupta ◽  
Sapna Saxena ◽  
Sarvesh Tanwar

The Internet of Things (IoT) comprises of various smart devices which are networked together to detect, accumulate, process, improve and interchange significant data over the Internet. IoT has improved our lifestyle by offering various applications such as intelligent home, smart healthcare, traffic monitoring and smart city devices. The IoT devices have restriction of power, battery life, memory and network constraints, so cloud can be used for accumulating and analyzing the IoT data. Due to the considerable increase in data transfer over Internet and other devices, the confidential information from the IoT sources required to be secure from any third party access. Cloud computing (CC) on the other side provides a protected, abrupt and advantageous data storage and computing services all over the internet. The integration of both these technologies can prove to be beneficial for each other. Therefore, we need an efficient and authentic method for secure communication in the IoT and cloud based big data environment. This paper provides a review of amalgamation of the IoT and cloud by featuring the implementation challenges and integration benefits.


2017 ◽  
Vol 15 (43) ◽  
pp. 9-18
Author(s):  
Amit Banerjee ◽  
Mohd Sameen Chishti ◽  
Sunjay Kumar

The emergence of Internet of Things [IoT] paves the path of the smart home.  A smart home learns the habits of residents to make intelligent decision, which requires knowledge to be communicated and stored. The communication of generated data creates loop-hole in security and privacy of the user of smart home. Another challenging issue while designing a smart home is that legacy home appliances lack the smart connectivity. This paper focuses on designing a secure architecture to access smart home appliances, while using the existing home appliances that lacks networking and processing power like a bulb or fan. To ensure secure communication using internet, we are using third party authentication tool deployed in cloud. We have installed a gateway as the entry point to our smart home and connected all the appliances to it. The user is authenticated by authentication server and gets access to the services. For implementation purpose, we used Kerberos as authentication tool and DragonBoard as gateway.


Information storage and security is one of key areas where much research is been done in this digital world where we communicate the data over using third party devices such as cloud by using smart devices such as mobiles so the security is an quite challenging factor where we access our data across the globe and with the social media coming into factor for the storage and accessibility of the data so there are many risk factors coming into process so we need to implement a smart and secure system for the authentication threats so here in this paper we implement a smart system in which face recognition aunthication system is implement between the cloud and mobile activity which give more security in terms of data storage and communication and then we evaluate using different graphs and also analyses the attacks


Entropy ◽  
2019 ◽  
Vol 21 (11) ◽  
pp. 1100 ◽  
Author(s):  
Luyu Huang ◽  
Yichen Zhang ◽  
Ziyang Chen ◽  
Song Yu

A unidimensional continuous-variable quantum key distribution protocol with untrusted detection is proposed, where the two legitimate partners send unidimensional modulated or Gaussian-modulated coherent states to an untrusted third party, i.e., Charlie, to realize the measurement. Compared with the Gaussian-modulated coherent-state protocols, the unidimensional modulated protocols take the advantage of easy modulation, low cost, and only a small number of random numbers required. Security analysis shows that the proposed protocol cannot just defend all detectors side channels, but also achieve great performance under certain conditions. Specifically, three cases are discussed in detail, including using unidimensional modulated coherent states in Alice’s side, in Bob’s side, and in both sides under realistic conditions, respectively. Under the three conditions, we derive the expressions of the secret key rate and give the optimal gain parameters. It is found that the optimal performance of the protocol is achieved by using unidimensional modulated coherent states in both Alice’s and Bob’s side. The resulting protocol shows the potential for long-distance secure communication using the unidimensional quantum key distribution protocol with simple modulation method and untrusted detection under realistic conditions.


2021 ◽  
Vol 11 (4) ◽  
pp. 1772
Author(s):  
Sultan Algarni ◽  
Fathy Eassa ◽  
Khalid Almarhabi ◽  
Abduallah Almalaise ◽  
Emad Albassam ◽  
...  

The distributed nature of Internet of Things (IoT) and its rapid increase on a large scale raises many security and privacy issues. Access control is one of the major challenges currently addressed through centralized approaches that may rely on a third party and they are constrained by availability and scalability, which may result in a performance bottleneck. Therefore, this paper proposes a novel solution to manage the delivery of lightweight and decentralized secure access control of an IoT system based on a multi-agent system and a blockchain. The main objective of the proposed solution is to build Blockchain Managers (BCMs) for securing IoT access control, as well as allowing for secure communication between local IoT devices. Moreover, the solution also enables secure communication between IoT devices, fog nodes and cloud computing.


2020 ◽  
Vol 43 ◽  
Author(s):  
Michael Tomasello

Abstract My response to the commentaries focuses on four issues: (1) the diversity both within and between cultures of the many different faces of obligation; (2) the possible evolutionary roots of the sense of obligation, including possible sources that I did not consider; (3) the possible ontogenetic roots of the sense of obligation, including especially children's understanding of groups from a third-party perspective (rather than through participation, as in my account); and (4) the relation between philosophical accounts of normative phenomena in general – which are pitched as not totally empirical – and empirical accounts such as my own. I have tried to distinguish comments that argue for extensions of the theory from those that represent genuine disagreement.


Sign in / Sign up

Export Citation Format

Share Document