scholarly journals Verifiable secure computation of linear fractional programming using certificate validation

Author(s):  
Nedal M. Mohammed ◽  
Laman R. Sultan ◽  
Ahmed A. Hamoud ◽  
Santosh S. Lomte

Outsourcing of scientic computations is attracting increasing attention since it enables the customers with limited computing resource and storage devices to outsource the sophisticated computation workloads into powerful service providers. However, it also comes up with some security and privacy concerns and challenges, such as the input and output privacy of the customers, and cheating behaviors of the cloud. Motivated by these issues, this paper focused on privacy-preserving Linear Fractional Programming (LFP) as a typical and practically relevant case for veriable secure multiparty computation. We will investigate the secure and veriable schema with correctness guarantees, by using normal multiparty techniques to compute the result of a computation and then using veriable techniques only to verify that this result was correct.

Author(s):  
Eunice Yeboah Afeti ◽  
Joshua Ofori Amanfo

Merchant adoption of mobile payments is facilitating new business models and changing the way merchants run their brick and mortar businesses. Despite the advantages of mobile payment adoption to the merchant, they still hesitate to adopt mobile payments. Thus, the study seeks to explore qualitatively through a case study the enablers and inhibitors to merchant adoption of mobile payments. The study identified that merchants are adopting mobile payments to facilitate new business models, to promote the disintermediation of traditional intermediaries, to offer different possibilities of growing their businesses, and to reduce transaction costs. Even though merchants believe that mobile payments adoption and use improve operational efficiency to their businesses, there are instances of fraud, particularly in the peer-to-peer transfer sector, data breaches, data security, and privacy concerns. Therefore, it is imperative for service providers of mobile payments to enhance technological issues regarding privacy protection that could enhance trust towards mobile payment adoption.


Mobile payment systems are rapidly surpassing traditional payment options due to their ease of use and efficiency. Their convenience, however, raises the question – how secure are these systems? There is a great deal of insecurity and risk for consumers as mobile payments involve a lot of financial information. Past research indicates that when involved in online activities and e-payments, consumers are specifically concerned about privacy and security. This study aims to understand influence of demographic variables on security and privacy concerns of consumers by conducting a survey of 1087 respondents in 4 major cities of the state of Gujarat, India. The results indicate that demographic variables age, occupation, annual income and city have significant relationship with security and privacy concerns of consumers towards mobile payments. The findings of this study can benefit mobile service providers, system developers and m-payment vendors to have an actionable segmentation of different target groups based on demographic variables. Practitioners can formulate relevant strategies to address security and privacy concerns which will ultimately facilitate adoption of mobile payment systems.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Lin Hou ◽  
Wei Liu ◽  
Lisha Yao ◽  
Xiaojian Liang ◽  
Guo-Qiang Zeng

In vehicular networks, the increasing value of transportation data and scale of connectivity also brings many security and privacy concerns. Peer authentication and message integrity are two vital security requirements to ensure safe transportation system. Because of the constrained resources of the units performing the cryptographic components, the proposed security-enhancing schemes should be lightweight and scalable. In this paper, we present a multisignature scheme derived from the SM2 signature which enables a group of parties to collaboratively sign a message and generate a compact joint signature at the end. Our scheme requires no preprocessing or interactions among the parties before signing, and its performance matches or surpasses known ones in terms of signing time, verification time, and signature size. Therefore, our scheme is also suitable for vehicular networks, with the goal to enhance security with small computation and storage cost.


Author(s):  
Eunice Yeboah Afeti ◽  
Joshua Ofori Amanfo

Merchant adoption of mobile payments is facilitating new business models and changing the way merchants run their brick and mortar businesses. Despite the advantages of mobile payment adoption to the merchant, they still hesitate to adopt mobile payments. Thus, the study seeks to explore qualitatively through a case study the enablers and inhibitors to merchant adoption of mobile payments. The study identified that merchants are adopting mobile payments to facilitate new business models, to promote the disintermediation of traditional intermediaries, to offer different possibilities of growing their businesses, and to reduce transaction costs. Even though merchants believe that mobile payments adoption and use improve operational efficiency to their businesses, there are instances of fraud, particularly in the peer-to-peer transfer sector, data breaches, data security, and privacy concerns. Therefore, it is imperative for service providers of mobile payments to enhance technological issues regarding privacy protection that could enhance trust towards mobile payment adoption.


Author(s):  
Zulfa Shaikh ◽  
Poonam Garg

Secure Multiparty Computation (SMC) can be defined as n number of parties who do joint computation on their inputs (x1, x2…xn) using some function F and want output in the form of y. The increase in sensitive data on a network raises concern about the security and privacy of inputs. During joint computation, each party wants to preserve the privacy of their inputs. Therefore, there is a need to define an efficient protocol that maintains privacy, security, and correctness parameters of SMC. In this chapter, an approach towards secure computation is provided and analyzed with security graphs.


Info ◽  
2014 ◽  
Vol 16 (3) ◽  
pp. 40-53 ◽  
Author(s):  
Mihai Constantinescu ◽  
Ertan Onur ◽  
Yunus Durmus ◽  
Shahrokh Nikou ◽  
Mark de Reuver ◽  
...  

Purpose – The purpose of this paper is to analyze mobile tethering from technological and social perspectives. Mobile tethering allows us to share cellular data connection with others over WiFi, Bluetooth or USB. Although the technology is ready and has promising outcomes, service providers and the users still keep their distance. Therefore, the incentives for the users and service providers should be identified. Design/methodology/approach – Technical challenges in terms of energy and bandwidth consumption are explored using an application specifically developed for mobile tethering. Usage issues are studied through conjoint analysis, in which we analyze the importance of technical aspects as well as social conditions for sharing data connection with others. Findings – The research shows that although energy, bandwidth and security are important technical challenges, users are mainly concerned about social aspects, such as with whom the connection will be shared, rather than monetary issues. Mobile tethering is a viable cooperative service, only when users are familiar with the person with whom the data connection is being shared. Research limitations/implications – In the technical evaluation of the mobile tethering application, only Android operating systems are being used. Other operating systems (e.g. iOS) may perform differently. Moreover, only a small fraction of smartphones and tablets has been tested. Practical implications – Service providers tend to block mobile tethering technology, as they do not have control and do not expect to gain revenues. However, service providers have the abilities to satisfy the security and privacy concerns of the users and can create secure femtocells for their customers. Social implications – Mobile tethering performance results indicate that more people can access the Internet while they are mobile even if they do not have cellular data subscription. More Internet-based services can be offered to people while they roam in other countries. Originality/value – For technology developers, both the key technical issues and the concerns of the consumers are highlighted. Future applications must contain reliable security and privacy protocols in their design. Moreover, the significance of the social networks is shown in the decision-making of the use of mobile tethering, especially with respect to the credit exchange.


Sign in / Sign up

Export Citation Format

Share Document