Mechanism Design Based Secure Data Object Replication

Author(s):  
Minzhe Guo ◽  
Prabir Bhattacharya
Author(s):  
Joaquín Pérez O. ◽  
Rodolfo A. Pazos ◽  
René Santaolaya ◽  
Juan Frausto S. ◽  
Guillermo Rodríguez O. ◽  
...  

Author(s):  
Reena Singh ◽  
Hemant Jalota

Data objects having low value like insurance or data-entry forms are shared between a client and rural business process outsourcing (RBPO) organisations for tasks like translation, proofreading, and data entry. These data objects are first decomposed into smaller parts and then assigned to RBPO users. Each user in a RBPO has access to only a few parts of a complete data object which he can leak to unauthorised users. But since the value of these parts is low, there is not enough incentive for the user to leak them. Such scenarios need good-enough security models that can provide reasonable security to an aggregate number of parts of low value data objects. In this chapter, the authors study the secure data assignment and leakage in RBPO by modeling it in the form of an optimisation problem. They discuss different scenarios of object decomposition and sharing, penalty assignment, and data leakage in the context of RBPO. They use LINGO toolbox to run their model and present insights.


2013 ◽  
Author(s):  
Aranyak Mehta
Keyword(s):  

2018 ◽  
Vol 12 (5) ◽  
pp. 393
Author(s):  
Olga V. Egorova ◽  
Gennady A. Timofeev ◽  
Marina V. Samoilova

2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


2018 ◽  
Vol 6 (9) ◽  
pp. 723-731
Author(s):  
Rakesh Prasad Sarang ◽  
Anshu Chaturvedi ◽  
D.N. Goswami

2018 ◽  
Vol 6 (5) ◽  
pp. 144-149
Author(s):  
H. Kousar ◽  
◽  
◽  
B.R.P. Babu

2019 ◽  
Vol 7 (4) ◽  
pp. 644-646
Author(s):  
O.Koteswara Rao ◽  
Y K Sundara Krishna ◽  
G K Mohan Devarakonda

Sign in / Sign up

Export Citation Format

Share Document