scholarly journals Identification Method of Content Changes of Information Contained Inside Files

2017 ◽  
Vol 44 (1) ◽  
pp. 117-190
Author(s):  
Artur Szleszyński

Abstract The thesis shows the use of message hash function for integrity attribute change identification in sensitive information asset. Changes introduced to file content may suggest confidentiality attribute violation. It has been verified in what way random changes introduced into file content affect function. The minor number of bytes changed in comparison to file size that was assumed, derives from potential benefits for the attacker. Large number of changes in the file may suggest the situation of encrypting it. Such an action leads to accessibility attribute violation

Author(s):  
Karyn Rastrick ◽  
Florian Stahl ◽  
Gottfried Vossen ◽  
Stuart Dillon

WiPo (Web in your pocket) is a prototypical mobile information provisioning concept that can offer potential benefits to a range of situations where data sources are vast, dynamic and unvalidated and where continuous Internet connectivity cannot be assured. One such case is that of search and rescue (SAR), a unique case of emergency management characterized by the need for high-quality, accurate and time-sensitive information. This paper reports on empirical research undertaken to explore the potential for a real-world application of a mobile service such as WiPo which is based on the delivery of highly curated, multi-source data made available offline. Adopting an interpretive interview-based approach, the authors evaluate the potential usefulness of WiPo for search and rescue incidents in New Zealand. Upon learning of the core functionality of WiPo and the alignment of that with the typical search and rescue situation, study participants were unanimously positive about its potential for improving search and rescue management and outcomes.


2014 ◽  
Vol 980 ◽  
pp. 194-197
Author(s):  
Erfaneh Noroozi ◽  
Salwani Bt Mohd Daud ◽  
Ali Sabouhi ◽  
Mohammad Reza Salehnamadi

In computer cryptography, digital signature is one of the best cryptography systems. Public-private keys are used to pass sensitive information however it can also be used to provide authentication on the particulars of a sender. Proposed algorithm is a new design and simple implementation mechanism for producing a digital signature. Some applications such as multi agent systems transferred data with small size and capacity. The new scheme minimizes the size of original file and gives us a dynamic and smaller hashed message output. In this algorithm load the original files then hashed the message and encode it with the private key of sender. Finally modify the established code into a unique digital signature at Base 16. We concentrate on designing and implementation of functions of algorithm.


2021 ◽  
Author(s):  
S. Chef ◽  
C.T. Chua ◽  
J.Y. Tay ◽  
C.L Gan

Abstract The use of optical techniques for attacking integrated circuits (ICs) at the silicon level is increasingly being reported. Although these attacks can be complex to set and require skilled attacker that can access expensive equipment, they are nonetheless very powerful. Among the different applications described in literature, there has been a focus on extracting data directly from embedded SRAM. Such attacks can provide access to highly sensitive information such as encryption keys and bypass various security strategies. An attacker usually exploits one of the several interactions that exist between light and semiconductor to generate an image where content can be directly qualified by the data in memory (Logic State Image – LSI). Thermal laser stimulation (TLS) and laser probing (EOFM-Electro-Optical Frequency Mapping) have been reported in the literature recently but Photoelectric Laser Stimulation (PLS) did not get as much attention. Considering the potential advantages of PLS over other techniques (e.g. lower power requirements to generate current/voltage change, effect can be triggered at shorter wavelength which may lead to an improved spatial resolution), we investigate in this paper if logic state images can be generated with PLS on a variety of devices and do a comparative assessment with state-of-the-art technologies to assess potential benefits and limitations.


Author(s):  
Karyn Rastrick ◽  
Florian Stahl ◽  
Gottfried Vossen ◽  
Stuart Dillon

WiPo (Web in your pocket) is a prototypical mobile information provisioning concept that can offer potential benefits to a range of situations where data sources are vast, dynamic and unvalidated and where continuous Internet connectivity cannot be assured. One such case is that of search and rescue (SAR), a unique case of emergency management characterized by the need for high-quality, accurate and time-sensitive information. This paper reports on empirical research undertaken to explore the potential for a real-world application of a mobile service such as WiPo which is based on the delivery of highly curated, multi-source data made available offline. Adopting an interpretive interview-based approach, the authors evaluate the potential usefulness of WiPo for search and rescue incidents in New Zealand. Upon learning of the core functionality of WiPo and the alignment of that with the typical search and rescue situation, study participants were unanimously positive about its potential for improving search and rescue management and outcomes.


2018 ◽  
Vol 7 (2.13) ◽  
pp. 281
Author(s):  
Doaa Yaseen Khudhur ◽  
Saif Saad Hameed ◽  
Shokhan M. Al-Barzinji

The Internet played - and still - the key that continuously changing our ways of interaction with people. As a result, several electronic services had emerged allowing businesses to grow by effectively allowing wide and easy interaction with customers and other businesses. The security and privacy of information over the internet in general and in electronic services providers have been the focus of widely published studies and researches, such that several software and hardware based solutions or hybrid of both is required. E-banking services grown significantly in the last decade where all financial matters of customers and businesses can be done online, and therefore, e-banking security and privacy is important. In this paper, I propose the use of Whirlpool hash function to enhance the security of e-bank service providers by encrypting customer’s card sensitive information. In addition, based on the review of several articles, I found that Whirlpool outperformed several hashing functions and resists several well-known attacks.  


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Ruiqi Hou ◽  
Fei Tang ◽  
Shikai Liang ◽  
Guowei Ling

As a commonly used algorithm in data mining, clustering has been widely applied in many fields, such as machine learning, information retrieval, and pattern recognition. In reality, data to be analyzed are often distributed to multiple parties. Moreover, the rapidly increasing data volume puts heavy computing pressure on data owners. Thus, data owners tend to outsource their own data to cloud servers and obtain data analysis results for the federated data. However, the existing privacy-preserving outsourced k -means schemes cannot verify whether participants share consistent data. Considering the scenarios with multiple data owners and sensitive information security in an outsourced environment, we propose a verifiable privacy-preserving federated k -means clustering scheme. In this article, cloud servers and participants perform k -means clustering algorithm over encrypted data without exposing private data and intermediate results in each iteration. In particular, our scheme can verify the shares from participants when updating the cluster centers based on secret sharing, hash function and blockchain, so that our scheme can resist inconsistent share attacks by malicious participants. Finally, the security and experimental analysis are carried out to show that our scheme can protect private data and get high-accuracy clustering results.


Computers ◽  
2021 ◽  
Vol 10 (7) ◽  
pp. 83
Author(s):  
Péter Marjai ◽  
Péter Lehotay-Kéry ◽  
Attila Kiss

Presently, almost every computer software produces many log messages based on events and activities during the usage of the software. These files contain valuable runtime information that can be used in a variety of applications such as anomaly detection, error prediction, template mining, and so on. Usually, the generated log messages are raw, which means they have an unstructured format. This indicates that these messages have to be parsed before data mining models can be applied. After parsing, template miners can be applied on the data to retrieve the events occurring in the log file. These events are made from two parts, the template, which is the fixed part and is the same for all instances of the same event type, and the parameter part, which varies for all the instances. To decrease the size of the log messages, we use the mined templates to build a dictionary for the events, and only store the dictionary, the event ID, and the parameter list. We use six template miners to acquire the templates namely IPLoM, LenMa, LogMine, Spell, Drain, and MoLFI. In this paper, we evaluate the compression capacity of our dictionary method with the use of these algorithms. Since parameters could be sensitive information, we also encrypt the files after compression and measure the changes in file size. We also examine the speed of the log miner algorithms. Based on our experiments, LenMa has the best compression rate with an average of 67.4%; however, because of its high runtime, we would suggest the combination of our dictionary method with IPLoM and FFX, since it is the fastest of all methods, and it has a 57.7% compression rate.


2014 ◽  
Vol 4 (1) ◽  
pp. 23-29
Author(s):  
Constance Hilory Tomberlin

There are a multitude of reasons that a teletinnitus program can be beneficial, not only to the patients, but also within the hospital and audiology department. The ability to use technology for the purpose of tinnitus management allows for improved appointment access for all patients, especially those who live at a distance, has been shown to be more cost effective when the patients travel is otherwise monetarily compensated, and allows for multiple patient's to be seen in the same time slots, allowing for greater access to the clinic for the patients wishing to be seen in-house. There is also the patient's excitement in being part of a new technology-based program. The Gulf Coast Veterans Health Care System (GCVHCS) saw the potential benefits of incorporating a teletinnitus program and began implementation in 2013. There were a few hurdles to work through during the beginning organizational process and the initial execution of the program. Since the establishment of the Teletinnitus program, the GCVHCS has seen an enhancement in patient care, reduction in travel compensation, improvement in clinic utilization, clinic availability, the genuine excitement of the use of a new healthcare media amongst staff and patients, and overall patient satisfaction.


Sign in / Sign up

Export Citation Format

Share Document