scholarly journals A Research Threshold Efficient Hybrid Encryption Schema for Secure File System

Electronic technologies have radically changed the way of doing business and the way of storing and sharing information. In the technology revolution, security is more affected with the introduction of distributed environment where data requires accessing from remote computers. When Operating Systems (OS) are running on a device with no file encryption, normally file access is controlled through user authentication mechanisms by its own operating system. However, an invader can easily bypass this fence if he gains physical access to the computer. To protect sensitive files/data even if physically accessed the device, the most widely accepted solution to this is to store the files encrypted on the physical media. Windows family of OS uses an EFS, similarly Gnupg is an encryption tool for operating systems such as FreeBSD, Solaris, MacOS to enforce security measure and much more algorithm which are using short length key or keys for encrypting the file-system. Even though these systems are good, still there is a question about confidentiality and privacy because of explosive growth of computing power and cryptanalysis tools and techniques. In this paper a novel approach for encrypting file system using Rbits cipher with PKC is proposed. In brief, Rbits enforce unlimited sub-keying mechanism in encryption process to avoid any sort of cryptanalysis

Author(s):  
Balal Sohail Et. al.

Macro based Malware has taken a great rise is these recent years, Attackers are now using this malware for hacking purposes. This virus is embedded inside the macro of a word document and can be used to infect the victim’s machine. These infected files are usually sent through emails and all antivirus software are unable to detect the virus due to the format of the file. Due to the format being a rich text file and not an executable file, the infected file is able to bypass all security. Hence it is necessary to develop a detection system for such attacks to help reduce the threat. Technical research is carried out to identify the tools and techniques essential in the completion of this system. Research on methodology is done to finalise which development cycle will be used and how functions will be carried out at each phase of the development cycle. This paper outlines the problems that people face once they are attacked through macro malwares and the way it can be mitigated. Lastly, all information necessary to start the implementation has been gathered and analysed


2021 ◽  
Author(s):  
◽  
Jayne Krisjanous

<p>The purpose of this thesis is to contribute a new health psychographic/ lifestyle segmentation of pregnant women in New Zealand who are in transition to first time motherhood. It provides a better understanding of the make up of the market and the way it aggregates into health lifestyle segments. By using a wide selection of pre-existing and pregnancy related health and attitude dimensions, it complements existing understanding and classifications of pregnancy health lifestyle. First, the study richly describes pregnancy health behaviour within a representative cohort of pregnant women in a transitional lifestyle using a holistic framework. It takes into account lifestyle as made up of a combination of factors and underlying motivations. Furthermore, it establishes the application of 'lifestyle' as it is used in marketing as legitimate for the study of a transitional health lifestyle. The research is cross disciplinary, and for that reason, integrates two perhaps seemingly disparate (marketing and health) understandings of lifestyle, using a somewhat novel approach. It is inclusive of high risk pregnant women and a much less oft studied group, normal, healthy or low risk women. Second, a key component of this study is the seminal development of a segmentation typology that classifies women's health in pregnancy through a situation specific psychographic approach. This typology has been termed 'Gravidographics', and identifies segments of pregnant women, who have distinct or unique identifiers in regard to their pregnancy health lifestyle. This knowledge will be useful for health behaviour change through social marketing and also the design and targeting of products and services to specific groups of pregnant consumers. A third focus of the study is the examination of health lifestyle within the concept of life stage transition. As pregnancy marks the transit into a new life stage, there are many adaptations that need to be made, and several underlying factors influence the way such a journey is approached and achieved. The study is exploratory and the conceptual framework, derived predominantly from the marketing and health literature, guides the study and informs development of the data collection tools. Eight main research questions are explored. The study uses a survey design and is cross sectional, with quantitative enquiry the dominant logic. A survey using a self administered health psychographic questionnaire was distributed by Lead Maternity Carers to pregnant women in their care. A sample of 478 women was obtained for this stage of the study. Quantitative analysis was undertaken through descriptive statistics and bi-variate analyses. Secondly, two step clustering was undertaken to develop pregnancy health lifestyle clusters. Four health lifestyle segments were identified. These segments were then profiled against additional variables and data that led to rich descriptions of each segment. Several managerial recommendations are made that will assist in the delivery and positioning of maternity health goods and services particularly in regard to healthcare marketing and segmentation. Secondly, recommendations for future marketing communication strategies targeting pregnant women are made. Through this work, the study's ultimate aim; making an academic contribution to knowledge that will lead to improved health outcomes for mother and baby, has been achieved.</p>


2021 ◽  
Author(s):  
Sandeep Kumar ◽  
Smruti R. Sarangi

Author(s):  
Senthil Kumar A. V. ◽  
Rathi M.

Online learning has entirely transformed the way of learning by the students. Online tests and quizzes play an important role in online learning, which provides accurate results to the instructor. But, the learners use different methods to cheat during online exams such as opening a browser to search for the answer or a document in the local drive, etc. They are not authenticated once they login and progress to attend the online exams. Different techniques are used in authenticating the students taking up the online exams such as audio or video surveillance systems, fingerprint, or iris recognition, etc. Keystroke dynamics-based authentication (KDA) method, a behavioral biometric-based authentication model has gained focus in authenticating the users. This chapter proposes the usage of KDA as a solution to user authentication in online exams and presents a detailed review on the processes of KDA, the factors that affect the performance of KDA, their applications in different domains, and a few keystroke dynamics-based datasets to authenticate the users during online exams.


2012 ◽  
Vol 6 (2) ◽  
pp. 53-63 ◽  
Author(s):  
U. S. Rawat ◽  
Shishir Kumar

Proposed is a secure and efficient approach for designing and implementing an enterprise-class cryptographic file system for Linux (ECFS) in kernel-space. It uses stackable file system interface to introduce a layer for encrypting files using symmetric keys, and public-key cryptography for user authentication and file sharing, like other existing enterprise-class cryptographic file systems. It differs itself from existing systems by including all public-key cryptographic operations and public-key infrastructure (PKI) support in kernel-space that protects it from attacks that may take place with a user-space PKI support. It has a narrower domain of trust than existing systems. It uses XTS mode of AES algorithm for file encryption for providing better protection and performance. It also uses kernel-keyring service for improving performance. It stores the cryptographic metadata in file’s access control list (ACL) as extended attributes to ease the task of file sharing. A secure protocol has also been designed and implemented to guard against various possible attacks, when its files are accessed remotely over an untrusted network.


Author(s):  
Giaime Ginesu ◽  
Mirko Luca Lobina ◽  
Daniele D. Giusto

Authentication is the way of identifying an individual. The techniques used to accomplish such practice strongly depend on the involved parties, their interconnection, and the required level of security. In all cases, authentication is used to enforce property protection, and may be specifically intended for the copyright protection of digital contents published on the Internet. This chapter introduces the basic concepts of authentication, explaining their relationship with property protection. The basic functionalities of challenge-response frameworks are presented, together with several applications and the future trends.


Author(s):  
M. Raisinghani

A new form of technology is changing the way commerce is being done globally. This article provides an overall description of mobile commerce and examines ways in which the Internet will be changing. It explains the requirements for operating mobile commerce and the numerous ways of providing this wireless Internet business. While the Internet is already a valuable form of business that has already changed the way the world is doing business, it is about to change again. Telecommunications, the Internet, and mobile computing are merging their technologies to form a new business called mobile commerce or the wireless Internet. This is being driven by consumer demand for wireless devices and the desire to be connected to information and data available through the Internet. There are many new opportunities that have only begun to be explored, and for many this will become a large revenue source for those who capitalize upon this new form of technology. However, like other capital ventures, these new opportunities have their drawbacks, which may limit growth of the mobile commerce market if not dealt with. Mobile e-commerce technology is changing our world of business just as the Internet alone has changed business today.


Author(s):  
Chia-Chu Chiang

Software maintenance is an inevitable process due to program evolution (Lehman & Belady, 1985). Adaptive maintenance (Schenidewind, 1987) is an activity used to adapt software to new environments or new requirements due to the evolving needs of new platforms, new operating systems, new software, and evolving business requirements. For example, companies have been adapting their legacy systems to Web-enabling environments of doing business that could not have been imagined even a decade ago (Khosrow-Pour & Herman, 2001; Werthner & Ricci, 2004).


Author(s):  
Fang Zhao

Over the past decade, with the advent of the Internet, organizations have changed the way they communicate internally and externally, the way they are configured, and the way they build partnerships. Today’s complex and volatile business world calls for changes and alternatives to the old and conventional paradigm of organizational design and new ways of doing business with others. E-business becomes one of the most important forces shaping today’s business. Virtual corporations and e-partnerships become increasingly popular in the perception of managers and in business operations.


Sign in / Sign up

Export Citation Format

Share Document