The Security Challenges of Client-Side Just-in-Time Engines

2012 ◽  
Vol 10 (2) ◽  
pp. 84-86 ◽  
Author(s):  
Chris Rohlf ◽  
Yan Ivnitskiy
2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Nabil Rifi ◽  
Nazim Agoulmine ◽  
Nada Chendeb Taher ◽  
Elie Rachkidi

In the past few years, the number of wireless devices connected to the Internet has increased to a number that could reach billions in the next few years. While cloud computing is being seen as the solution to process this data, security challenges could not be addressed solely with this technology. Security problems will continue to increase with such a model, especially for private and sensitive data such as personal data and medical data collected with more and more smarter connected devices constituting the so called Internet of Things. As a consequence, there is an urgent need for a fully decentralized peer-to-peer and secure technology solution to overcome these problems. The blockchain technology is a promising just-in-time solution that brings the required properties to the field. However, there are still challenges to address before using it in the context of IoT. This paper discusses these challenges and proposes a secure IoT architecture for medical data based on blockchain technology. The solution introduces a protocol for data access, smart contracts and a publisher-subscriber mechanism for notification. A simple analytical model is also presented to highlight the performance of the system. An implementation of the solution as a proof of concept is also presented.


The work suggests a unique data security protocol for trusted online validation of e-documents like university certificates to confirm its credibility on different aspects. The idea reliably validates such e-documents from both the issuing authority and incumbent perspectives by strongly complying the security challenges like authentication, confidentiality, integrity and non-repudiations. At the very beginning, the parent institute physically issues the client copyright signature to the incumbent and stores this signature and biometric fingerprint of the incumbent on the server database. Additionally, the server secretly fabricates ownership signatures of parent institute and concern officer both within the e-document and this certified e-document is kept on the server database. Importantly, these signature fabrications are governed by self-defined hash computations on incumbent registration and certificate number respectively. Next, the server transmits this signed e-document to the client after a successful login by the client. Now client conceals shared copyright signature and taken thumb impression of the incumbent separately within this received e-document. Critically, these client-side signature castings are employed through self-defined hash computations on the incumbent name and obtained marks respectively. Finally, this authenticated e-document is validated at the server end by sensing all authentic signatures from it through those same identical hash operations. For stronger authenticity each signature is concealed by tracing its valid or authentic circular orientation of fragment sequences and embedding locations both derived from respective hash operations. Also, each signature is dispersed in non-overlapping manners on each separate region of the e-document promoting better signature recovery. Additional robustness is further injected with variable encoding of signature bits on different transformed pixel byte components of the e-Certificate image. Overall, the scheme confirms significant performance enhancements over exiting approaches with exhaustive simulation results on image data hiding aspects and their standardized comparisons


Author(s):  
F. Jacob Seagull ◽  
Danny Ho ◽  
James Radcliffe ◽  
Yan Xiao ◽  
Peter Hu ◽  
...  

2003 ◽  
pp. 24-27 ◽  
Author(s):  
Mirosław Wasilewski
Keyword(s):  

Przedstawiono wyniki badań, których celem było określenie możliwości wprowadzenia systemu dostaw na czas środków do produkcji w gospodarstwach rolniczych oraz warunków koniecznych do spełnienia w tym zakresie. Badania przeprowadzono w 2000 roku.


Sign in / Sign up

Export Citation Format

Share Document