scholarly journals To Find Your Location: Secure and Practical Point Location Scheme

2020 ◽  
Author(s):  
Jingjing Guo ◽  
Jiacong Sun

Abstract With the ubiquitous mobile devices and the advanced wireless communication, location-based service (LBS) helps people to enjoy a convenient lifestyle and has attracted numerous research interests. As a basic query process in LBS system, point location requires to find a region containing the query point. Since location belongs to sensitive information and also leads other private information leaked, it is urgent to design a secure and efficient point location scheme. In this paper, we propose a point location scheme named SecPL to protect sensitive information while supporting high efficient location query. Specifically, we introduce a LineTest scheme from asymmetric scalar-product-preserving encryption (ASPE) to facilitate the checking of whether a point lies above or below a line. Furthermore, the SecPL scheme is designed by leveraging LineTest and order-preserving encryption (OPE) scheme. Through detailed security analysis, we demonstrate that SecPL scheme achieves data privacy and query privacy at the same time. Finally, the performance evaluation demonstrates the high efficiency of the proposed SecPL scheme.

2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Huiyong Wang ◽  
Mingjun Luo ◽  
Yong Ding

Biometric based remote authentication has been widely deployed. However, there exist security and privacy issues to be addressed since biometric data includes sensitive information. To alleviate these concerns, we design a privacy-preserving fingerprint authentication technique based on Diffie-Hellman (D-H) key exchange and secret sharing. We employ secret sharing scheme to securely distribute fragments of critical private information around a distributed network or group, which softens the burden of the template storage center (TSC) and the users. To ensure the security of template data, the user’s original fingerprint template is stored in ciphertext format in TSC. Furthermore, the D-H key exchange protocol allows TSC and the user to encrypt the fingerprint template in each query using a random one-time key, so as to protect the user’s data privacy. Security analysis indicates that our scheme enjoys indistinguishability against chosen-plaintext attacks and user anonymity. Through experimental analysis, we demonstrate that our scheme can provide secure and accurate remote fingerprint authentication.


Symmetry ◽  
2021 ◽  
Vol 13 (12) ◽  
pp. 2347
Author(s):  
Fandi Aditya Putra ◽  
Kalamullah Ramli ◽  
Nur Hayati ◽  
Teddy Surya Gunawan

Over recent years, the incidence of data breaches and cyberattacks has increased significantly. This has highlighted the need for sectoral organizations to share information about such events so that lessons can be learned to mitigate the prevalence and severity of cyber incidents against other organizations. Sectoral organizations embody a governance relationship between cross-sector public and private entities, called public-private partnerships (PPPs). However, organizations are hesitant to share such information due to a lack of trust and business-critical confidentially issues. This problem occurs because of the absence of any protocols that guarantee privacy protection and protect sensitive information. To address this issue, this paper proposes a novel protocol, Putra-Ramli Secure Cyber-incident Information Sharing (PURA-SCIS), to secure cyber incident information sharing. PURA-SCIS has been designed to offer exceptional data and privacy protection and run on the cloud services of sectoral organizations. The relationship between organizations in PURA-SCIS is symmetrical, where the entities must collectively maintain the security of classified cyber incident information. Furthermore, the organizations must be legitimate entities in the PURA-SCIS protocol. The Scyther tool was used for protocol verification in PURA-SCIS. The experimental results showed that the proposed PURA-SCIS protocol provided good security properties, including public verifiability for all entities, blockless verification, data privacy preservation, identity privacy preservation and traceability, and private information sharing. PURA-SCIS also provided a high degree of confidentiality to protect the security and integrity of cyber-incident-related information exchanged among sectoral organizations via cloud services.


Author(s):  
Harshal Jorwekar

The mystery between the emotional improvement of medical information protection interest and long periods of administrative guideline has eased back advancement for electronic medical records (EMRs). In this paper, we propose a efficient, secure and decentralized Blockchain system for data privacy preserving and sharing. This manages confidentiality, authentication, data preserving and data sharing when handling sensitive information. We exploit consortium Blockchain and smart contracts to accomplish secure information storage and sharing, which forestalls information sharing without consent. The patient’s historical data, medical record, patient’s private information is very critical and needs to be stored and maintained securely. The proposed framework builds information security and eliminates the cost, time, and assets needed to deal with the medical care information records.


Author(s):  
Chen-Jing Sun ◽  
Li-Ping Zhao ◽  
Rui Wang

: With the development of industrialization, the global environmental pollution and energy crisis are becoming increasingly serious. Organic pollutants pose a serious health threat to human beings and other organisms. The removal of organic pollutants in environment has become a global challenge. The photocatalytic technology has been widely used in the degradation of organic pollutants with its characteristics of simple process, high efficiency, thorough degradation and no secondary pollution. However, the single photocatalyst represented by TiO2 has disadvantages of low light utilization rate and high recombination rate of photocarriers. Building heterojunction is considered one of the most effective methods to enhance the photocatalytic performance of single photocatalyst, which can improve the separation efficiency of photocarriers and utilization of visible light. The classical heterojunction can be divided into four different cases: type I, typeⅡ, p–n heterojunctions and Z-scheme junction. In this paper, the recent progress in the treatment of organic pollution by heterostructure photocatalysts is summarized and the mechanism of heterostructure photocatalysts for the treatment of organic pollutants is reviewed. It is expected that this paper can deepen the understanding of heterostructure photocatalysts and provide guidance for high efficient photocatalytic degradation of organic pollutants in the future.


2018 ◽  
Vol 2018 ◽  
pp. 1-10
Author(s):  
Hua Dai ◽  
Hui Ren ◽  
Zhiye Chen ◽  
Geng Yang ◽  
Xun Yi

Outsourcing data in clouds is adopted by more and more companies and individuals due to the profits from data sharing and parallel, elastic, and on-demand computing. However, it forces data owners to lose control of their own data, which causes privacy-preserving problems on sensitive data. Sorting is a common operation in many areas, such as machine learning, service recommendation, and data query. It is a challenge to implement privacy-preserving sorting over encrypted data without leaking privacy of sensitive data. In this paper, we propose privacy-preserving sorting algorithms which are on the basis of the logistic map. Secure comparable codes are constructed by logistic map functions, which can be utilized to compare the corresponding encrypted data items even without knowing their plaintext values. Data owners firstly encrypt their data and generate the corresponding comparable codes and then outsource them to clouds. Cloud servers are capable of sorting the outsourced encrypted data in accordance with their corresponding comparable codes by the proposed privacy-preserving sorting algorithms. Security analysis and experimental results show that the proposed algorithms can protect data privacy, while providing efficient sorting on encrypted data.


2018 ◽  
Vol 2018 ◽  
pp. 1-7 ◽  
Author(s):  
Run Xie ◽  
Chanlian He ◽  
Dongqing Xie ◽  
Chongzhi Gao ◽  
Xiaojun Zhang

With the advent of cloud computing, data privacy has become one of critical security issues and attracted much attention as more and more mobile devices are relying on the services in cloud. To protect data privacy, users usually encrypt their sensitive data before uploading to cloud servers, which renders the data utilization to be difficult. The ciphertext retrieval is able to realize utilization over encrypted data and searchable public key encryption is an effective way in the construction of encrypted data retrieval. However, the previous related works have not paid much attention to the design of ciphertext retrieval schemes that are secure against inside keyword-guessing attacks (KGAs). In this paper, we first construct a new architecture to resist inside KGAs. Moreover we present an efficient ciphertext retrieval instance with a designated tester (dCRKS) based on the architecture. This instance is secure under the inside KGAs. Finally, security analysis and efficiency comparison show that the proposal is effective for the retrieval of encrypted data in cloud computing.


Author(s):  
Aya Mabrouki ◽  
Mohamed Latrach

This chapter proposes an overview of microwave energy harvesting with focuses on the design of high efficiency low power rectifying circuits. A background survey of RF energy harvesting techniques is presented first. Then, the performances of conventional rectifier topologies are analyzed and discussed. A review of the most efficient rectenna designs, from the state of the art, is also presented. Design considerations for low power rectifier operations are detailed and new high efficient rectifying circuits are designed and evaluated in both GSM and ISM bands under low power constraints.


2020 ◽  
Vol 5 (4) ◽  
pp. 395-398
Author(s):  
Taleb Samad Obaid

To transmit sensitive information over the unsafe communication network like the internet network, the security is precarious tasks to protect this information. Always, we have much doubt that there are more chances to uncover the information that is being sent through network terminals or the internet by professional/amateur parasitical persons. To protect our information we may need a secure way to safeguard our transferred information. So, encryption/decryption, stenographic and vital cryptography may be adapted to care for the required important information. In system cryptography, the information transferred between both sides sender/receiver in the network must be scrambled using the encryption algorithm. The second side (receiver) should be outlook the original data using the decryption algorithms. Some encryption techniques applied the only one key in the cooperation of encryption and decryption algorithms. When the similar key used in both proceeds is called symmetric algorithm. Other techniques may use two different keys in encryption/decryption in transferring information which is known as the asymmetric key.  In general, the algorithms that implicated asymmetric keys are much more secure than others using one key.   RSA algorithm used asymmetric keys; one of them for encryption the message, and is known as a public key and another used to decrypt the encrypted message and is called a private key. The main disadvantage of the RSA algorithm is that extra time is taken to perform the encryption process. In this study, the MATLAB library functions are implemented to achieve the work. The software helps us to hold very big prime numbers to generate the required keys which enhanced the security of transmitted information and we expected to be difficult for a hacker to interfere with the private information. The algorithms are implemented successfully on different sizes of messages files.


2019 ◽  
Vol 3 (122) ◽  
pp. 59-71
Author(s):  
Volodymyr Serhiiovych Hryshyn ◽  
Serhii Oleksiiovych Abramov

Technological possibilities of jet processing cause increased attention to the study of the regularities of the process. The main interest for practice is the establishment of the kind of dependencies between technological parameters (abrasive particles size, particle speed, concentration, compressed air pressure, attack angle, physical and mechanical properties of particles and surface to be treated) and initial process parameters (roughness of the treated surface, removal rates of the metal and libel). That, in turn, determines the necessity of optimal choice of the values of technological parameters in the conditions of a concrete production situation. The basic regularities can be established as a result of regression analysis of experimental data. However, the use of the resulting laws is limited to the complexity of the process and relatively narrow areas of changing the parameters of the experiment.The purpose of the work is to determine the factors that determine the formation of a microrelief in the area of the abrasive air jet, the relationship between them and the degree of their effect on the intensity of the formation of a microrelief; formation of a model of finishing treatment of collector plates, creation of theoretical bases and methodology of designing high-efficient resource-saving technological processes of production of motor collectors of electric machines.Analysis of recent research and publications. The following contributions were made to the development of the theory of modeling of the inkjet-abrasive surface treatment: Volovetsky O.E., Denysyuk V.Yu., Kharchik M.M., Buts BP, Andilahi A.A., Novikov FV, Gordeyev AI, Urbanyuk Ye.A., Silin R.S. and other.The most universal approach based on determining the search dependencies and solving the problem of optimizing the technological parameters of the processing process as a result of statistical simulation, namely the ability to control the input parameters before the start of the model or in the process of work - one of the key benefits of using simulation modeling for the analysis of systems and processes. This allows you to determine the optimal parameters, which maximize the efficiency of the processes, determine the relationship between the input and output parameters.The paper considers: creation of theoretical bases and methodology of designing high-efficiency resource-saving technological processes of production of motor collectors of electric machines; the process of formation of microrelief of collector plates in the area of the abrasive air jet, the relationship between the factors and the degree of their influence on the intensity of formation. The formation of a model of finishing treatment of collector plates treated with silicon carbide (black) was determined.Prospects for further research are the improvement of the technological process of obtaining collector nodes on the possibilities of implementation.


Author(s):  
Irene Chen

The story describes how three school institutes are grappling with the loss of private information, each through a unique set of circumstances. Pasadena City Public Schools discovered that it had sold several computers containing the names and Social Security numbers of employees as surplus. Stephens Public Schools learned that personal information about students at one of its middle schools was lost when a bag containing a thumb drive was stolen. Also, Woodlands Public Schools accidentally exposed employee personal data on a public Web site for a short period of time. How should each of the institutes react?


Sign in / Sign up

Export Citation Format

Share Document