An efficient data management architecture for the large-scale deployment of Resource Public Key Infrastructure

2015 ◽  
pp. 1177-1182 ◽  
Author(s):  
Cuicui Wang ◽  
Zhiwei Yan ◽  
Anlei Hu
2013 ◽  
Vol 831 ◽  
pp. 276-281
Author(s):  
Ya Jie Ma ◽  
Zhi Jian Mei ◽  
Xiang Chuan Tian

Large-scale sensor networks are systems that a large number of high-throughput autonomous sensor nodes are distributed over wide areas. Much attention has paid to provide efficient data management in such systems. Sensor grid provides low cost and high performance computing to physical world data perceived through sensors. This article analyses the real-time sensor grid challenges on large-scale air pollution data management. A sensor grid architecture for pollution data management is proposed. The processing of the service-oriented grid management is described in psuedocode. A simulation experiment investigates the performance of the data management for such a system.


2021 ◽  
Vol 2021 (4) ◽  
pp. 184-202
Author(s):  
Alexandra Dirksen ◽  
David Klein ◽  
Robert Michael ◽  
Tilman Stehr ◽  
Konrad Rieck ◽  
...  

Abstract HTTPS is a cornerstone of privacy in the modern Web. The public key infrastructure underlying HTTPS, however, is a frequent target of attacks. In several cases, forged certificates have been issued by compromised Certificate Authorities (CA) and used to spy on users at large scale. While the concept of Certificate Transparency (CT) provides a means for detecting such forgeries, it builds on a distributed system of CT logs whose correctness is still insufficiently protected. By compromising a certificate authority and the corresponding log, a covert adversary can still issue rogue certificates unnoticed. We introduce LogPicker, a novel protocol for strengthening the public key infrastructure of HTTPS. LogPicker enables a pool of CT logs to collaborate, where a randomly selected log includes the certificate while the rest witness and testify the certificate issuance process. As a result, CT logs become capable of auditing the log in charge independently without the need for a trusted third party. This auditing forces an attacker to control each participating witness, which significantly raises the bar for issuing rogue certificates. LogPicker is efficient and designed to be deployed incrementally, allowing a smooth transition towards a more secure Web.


2020 ◽  
Author(s):  
M Khan

The large-scale utilization of biometric authentication systems creates a demand for effective and reliable security and privacy of its data. Biometric data is not secret and if compromised, it can have catastrophic effects on the integrity of the whole verification system. To address these issues, this paper presents a novel encryption and watermarking method by using public key infrastructure for the secure transmission of biometric data over network. Encryption is applied on the biometric template before embedding as a watermark to make it more secure and robust and then, it is hid into the cover image. Experimental results show that the security, performance, and accuracy of the presented method is encouraging comparable with the other methods found in the current literature.


2012 ◽  
Vol 107 (3) ◽  
pp. 425-435 ◽  
Author(s):  
Jens Meyer ◽  
Stefan Ostrzinski ◽  
Daniel Fredrich ◽  
Christoph Havemann ◽  
Janina Krafczyk ◽  
...  

2020 ◽  
Author(s):  
M Khan

The large-scale utilization of biometric authentication systems creates a demand for effective and reliable security and privacy of its data. Biometric data is not secret and if compromised, it can have catastrophic effects on the integrity of the whole verification system. To address these issues, this paper presents a novel encryption and watermarking method by using public key infrastructure for the secure transmission of biometric data over network. Encryption is applied on the biometric template before embedding as a watermark to make it more secure and robust and then, it is hid into the cover image. Experimental results show that the security, performance, and accuracy of the presented method is encouraging comparable with the other methods found in the current literature.


Author(s):  
Md. Rezaul Karim Miajee

This paper presents the profiles related to public-key Infrastructure (PKI) for the Internet. The PKI manages public keys automatically through the use of public-key certificates. It provides a basis for accommodating interoperation between PKI entities. A large-scale PKI issues, revokes and manages digital signature public-key certificates to allow distant parties to reliably authenticate each other. A sound digital signature PKI should provide the basic foundation needed for issuing any kind of public-key certificate.  


Sign in / Sign up

Export Citation Format

Share Document