Right Transfer Method Based on Double HASH Chain

2014 ◽  
Vol 631-632 ◽  
pp. 952-957
Author(s):  
Ping Zhu ◽  
Mu Yao Lu

This Paper analyzes security issues during the process of the right transfer, sums up the basic needs during the transfer and the defects of existing rights transfer, and puts forward the right transfer program based on double HASH chain, which achieves the transfer of the digital right under the control of HASH Distance and meta-rights. Security analysis shows that the authentication, integrity, confidentiality, and impartiality of the program are well guaranteed.

2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Secure and efficient authentication mechanism becomes a major concern in cloud computing due to the data sharing among cloud server and user through internet. This paper proposed an efficient Hashing, Encryption and Chebyshev HEC-based authentication in order to provide security among data communication. With the formal and the informal security analysis, it has been demonstrated that the proposed HEC-based authentication approach provides data security more efficiently in cloud. The proposed approach amplifies the security issues and ensures the privacy and data security to the cloud user. Moreover, the proposed HEC-based authentication approach makes the system more robust and secured and has been verified with multiple scenarios. However, the proposed authentication approach requires less computational time and memory than the existing authentication techniques. The performance revealed by the proposed HEC-based authentication approach is measured in terms of computation time and memory as 26ms, and 1878bytes for 100Kb data size, respectively.


2018 ◽  
Vol 2018 ◽  
pp. 1-7 ◽  
Author(s):  
Run Xie ◽  
Chanlian He ◽  
Dongqing Xie ◽  
Chongzhi Gao ◽  
Xiaojun Zhang

With the advent of cloud computing, data privacy has become one of critical security issues and attracted much attention as more and more mobile devices are relying on the services in cloud. To protect data privacy, users usually encrypt their sensitive data before uploading to cloud servers, which renders the data utilization to be difficult. The ciphertext retrieval is able to realize utilization over encrypted data and searchable public key encryption is an effective way in the construction of encrypted data retrieval. However, the previous related works have not paid much attention to the design of ciphertext retrieval schemes that are secure against inside keyword-guessing attacks (KGAs). In this paper, we first construct a new architecture to resist inside KGAs. Moreover we present an efficient ciphertext retrieval instance with a designated tester (dCRKS) based on the architecture. This instance is secure under the inside KGAs. Finally, security analysis and efficiency comparison show that the proposal is effective for the retrieval of encrypted data in cloud computing.


Author(s):  
Normi Sham Awang Abu Bakar ◽  
Iqram Mahmud

The Android Market is the official (and primary) storefor Android applications. The Market provides users with average user ratings, user reviews, descriptions, screenshots,and permissions to help them select applications. Generally, prior to installation of the apps, users need to agree on the permissions requested by the apps, they are not given any other option. Essentially, users may not aware on some security issues that may arise from the permissions. Some apps request the right to manipulate sensitive data, such as GPS location, photos, calendar, contact, email and files. In this paper, we explain the sources of sensitive data, what the malicious apps can do to the data, and apply the empirical software engineering analysis to find the factors that could potentially influence the permissions in Android apps. In addition, we also highlight top ten most implemented permissions in Android apps and also analyse the permissions for the apps categories in Android.


PEDIATRICS ◽  
1951 ◽  
Vol 7 (2) ◽  
pp. 247-258
Author(s):  
JORGEN S. DICH

The subject of this talk concerns social medicine in the Scandinavian countries, not socialized medicine. The term socialized medicine has a political bias which is not in conformity with the conception of social medicine in Scandinavia. Every step in the development of the Scandinavian social medicine program has been adopted unanimously by all parties, irrespective of their attitudes toward socialism itself. Political parties have advocated liberalism and opposed socialism with the same ardor with which they have supported the expansion of social medicine. In Scandinavia, therefore, it is not necessary to advise us to "Keep politics out of this picture." Politics have always been omitted, even to the extent that a phrase corresponding to the American "socialized medicine" has never been used in Scandinavia. And if you were to try introducing it, it would not be understood. What is social medicine? It can be defined as an organization of the medical services according to a certain conception of individual or human rights and public obligations in a modern society. In all countries it is accepted that there are some basic needs which everyone has the right to satisfy, irrespective of income. Protection of personal freedom belongs to this group; so does education of the children.


Author(s):  
Christian Wittke ◽  
Kai Lehniger ◽  
Stefan Weidling ◽  
Mario Schoelzel

With the growing number of wireless devices in the internet of things (IoT), maintenance and management of these devices has become a key issue. In particular, the ability to wirelessly update devices is a must in order to fix security issues and software bugs, or to extend firmware functionality. Code update mechanisms in wireless sensor networks (WSNs), a subset of IoT networks, must handle limited resources and strict constraints. Also, over-the-air (OTA) code updates in the context of an IoT ecosystem may open new security vulnerabilities. An IoT security framework should therefore be extended with additional mechanisms to secure the OTA code update functionality. The chapter presents an overview of various OTA code update techniques for WSNs and their security flaws along with some existing attacks and possible countermeasures. It is discussed which attacks can be used more easily with the code update functionality. Countermeasures are compared as to whether they secure the weakened security objectives, giving a guideline to choose the right combination of countermeasures.


2021 ◽  
pp. 25-46
Author(s):  
Michael P. Hoffmann ◽  
Carrie Koplinka-Loehr ◽  
Danielle L. Eiseman

A plant, whether wheat or a giant redwood, needs water, air, sunlight, the right temperature, and soil. Despite their many variations, the plants we depend on for food have these basic needs, and the animals we elect to eat have similar ones. Plants may consist of up to 90% water, which has several roles, including moving nutrients throughout the plant and providing the turgor, or water pressure, that keeps stems and leaves upright. Water also keeps the plant cool by evaporating through small pores in the leaves. During photosynthesis, the water molecule (H...


Computers ◽  
2020 ◽  
Vol 9 (1) ◽  
pp. 18 ◽  
Author(s):  
Konstantinos Rantos ◽  
Arnolnt Spyros ◽  
Alexandros Papanikolaou ◽  
Antonios Kritsas ◽  
Christos Ilioudis ◽  
...  

Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation. Combined with advanced security analysis, threat intelligence helps reduce the time between the detection of an attack and its containment. This is achieved by continuously providing information, accompanied by data, on existing and emerging cyber threats and vulnerabilities affecting corporate networks. This paper addresses challenges that organisations are bound to face when they decide to invest in effective and interoperable cybersecurity information sharing and categorises them in a layered model. Based on this, it provides an evaluation of existing sources that share cybersecurity information. The aim of this research is to help organisations improve their cyber threat information exchange capabilities, to enhance their security posture and be more prepared against emerging threats.


Author(s):  
Mazza Francesca
Keyword(s):  

This commentary analyses Article 9.1.15 of the UNIDROIT Principles of International Commercial Contracts (PICC) concerning the undertakings of the assignor with respect to the assignee. According to Art 9.1.15, the assignor undertakes that the assigned right exists at the time of the assignment. This is not the case if, for instance, the contract from which the purported right arises had never been concluded or was void, or had previously been avoided. Similarly, if the obligor had already performed its obligation, the right would no longer exist. If a future right is assigned, no such undertaking exists. Rather, the assignee takes the risk that the future right never comes into existence. This commentary discusses the rule which entitles the assignor to assign the right, assert against the assignee all the defences that the obligor would have been able to assert against the assignor, the right of set-off against the assignee if it was available to the obligor before the notice of assignment of a right was received, and reimbursement of payment by the obligor.


Electronics ◽  
2019 ◽  
Vol 8 (9) ◽  
pp. 978 ◽  
Author(s):  
Yunfa Li ◽  
Yifei Tu ◽  
Jiawa Lu

With the increasing demand for intelligent services of the Internet of Things (IoT), its security issues have attracted widespread attention recently. Since most of the existing identity authentication policies are based on a single authentication mode, they are highly likely to cause problems such as illegal operation and stealing of sensor information. In order to meet the needs of increasing IoT users for the security management of intelligent services, a multi-point collaborative authentication method based on user image intelligent collection for the security problems faced by IoT in identity authentication is proposed in the paper. This method firstly collects the identity of the legal user through the intelligent collection technology and then realizes the identity authentication of the unidentified user through the collaborative authentication between the local domain management machine, the back-end image management machine, and the cloud server. Compared with the traditional single identity authentication method, our method uses three-party collaborative authentication to avoid the problem of sensor information stealing easily caused by a single authentication method, which makes the user’s identity authentication more secure and effective. The security analysis shows that the method is able to resist multiple attacks and prevent the sensor information from being illegally operated and stolen, protecting the security of the sensor information.


Sign in / Sign up

Export Citation Format

Share Document