content security
Recently Published Documents


TOTAL DOCUMENTS

118
(FIVE YEARS 22)

H-INDEX

9
(FIVE YEARS 2)

Author(s):  
Zaki Ullah ◽  
Muhammad Inam Ul Haq ◽  
Samiullah Khan ◽  
Muhammad Zubair

The world is growing very rapidly concerning technology. In the next-generation Internet, the existing architecture requires to be upgraded from Host-Centric Networking paradigm to Information-centric networking architecture. The unique aspect of information-centric networking is in-network cashing. Due to the system augmentation and In-network cashing technique, this novel system needs extremely high content security to ensure system integrity and maintenance. 5G network may be supported by the Information-Centric Network due to its high data transmission rate. In order to handle the serious security issues such as attack on confidentiality, authentication and integrity of the content, a Digital Signature based Access Control Mechanism in Information-Centric Network (DSAC) scheme is proposed to enhance security of ICN. Briefly, this new scheme uses Digital Signature, hash function, Trusted Third Party (TTP) and Proxy TTP. The client request for content, after receiving a request, the content provider generates and encrypts content with the digital signature and random value ‘k’ hash function and send it to TTP. After the signing process, the TTP sends the encryption hash key to Proxy TTP. In this proposed scheme authentication, confidentiality, the integrity aspects of the content security are improved.


2021 ◽  
Vol 22 (7) ◽  
pp. 1135-1141
Author(s):  
Jae-Ung Lee ◽  
Woo-Young Soh

Author(s):  
Zaki Ullah ◽  
Samiullah Khan

The world is growing very rapidly concerning technology. In the next-generation Internet, the existing architecture requires to be upgraded from Host-Centric Networking paradigm to Information-centric networking architecture. The unique aspect of information-centric networking is in-network cashing. Due to the system augmentation and In-network cashing technique, this novel system needs extremely high content security to ensure system integrity and maintenance. 5G network may be supported by the Information-Centric Network due to its high data transmission rate. In order to handle the serious security issues such as attack on confidentiality, authentication and integrity of the content, a Digital Signature based Access Control Mechanism in Information-Centric Network (DSAC) scheme is proposed to enhance security of ICN. Briefly, this new scheme uses Digital Signature, hash function, Trusted Third Party (TTP) and Proxy TTP. The client request for content, after receiving a request, the content provider generates and encrypts content with the digital signature and random value ‘k’ hash function and send it to TTP. After the signing process, the TTP sends the encryption hash key to Proxy TTP. In this proposed scheme authentication, confidentiality, the integrity aspects of the content security are improved.


2021 ◽  
pp. 110-118
Author(s):  
A.P. Shalin ◽  

Discussed is the growing influence of the Internet and social networks on modern society and the formation of a young person’s personality. Due to the development of digital and telecommunication technologies, the number of treats and crimes in this field has been increasing. Thus, the problem of content security and violent content faced by the state and society has never been as acute as in recent years. The article discusses the existing content management systems and their features and briefly describes the activity of the Federal service for supervision of oommunication and information technology Roskomnadzor, as well as its successes and shortcomings. It also describes steps taken by the state in the field of content management and provides examples of existing regulations in the Russian Federation. The article discusses the role of social welfare organizations in the creation of safe cyberspace. It lists public organizations that existed in Russia and were involved in content management and security activities. With the abundance of violent content, some of results obtained by these organizations and solutions they use can be reused to develop a secure virtual environment today.


Author(s):  
Muni Sekhar Velpuru

Digital content security gained immense attention over past two decades due rapid digitization of industries and government sectors, and providing security to digital content became a vital challenge. Digital watermarking is one prominent solution to protect digital content from tamper detection and content authentication. However, digital watermarking can alter sensitive information present on cover-content during embedding, then the recovery of exact cover-content may not be possible during extraction process. Moreover, certain applications may not allow small distortions in cover-content. Hence, reversible watermarking techniques of digital content can extract cover-content and watermark completely. Additionally, reversible watermarking is gaining popularity by an increasing number of applications in military, law enforcement, healthcare. In this chapter, the authors compare and contrast the different reversible watermarking techniques with quality and embedding capacity parameters. This survey is essential due to the rapid evolution of reversible watermarking techniques.


Author(s):  
Kouraogo Yacouba ◽  
Orhanou Ghizlane ◽  
Elhajji Said

Many financial institutions interact with their customers via short message services (SMS), which is today one of the fastest and most powerful means of communicating information around the world. This information can sometimes be an access code such as the unique password (OTP) for two-factor authentication (2FA) or banking information and personal identities. All this data is confidential, and it is a major disadvantage to send them since an SMS service does not provide data encryption during network transmission and on mobile. Recently, OTPs via SMS have suffered from strong attacks that intercept messages. In order to avoid attacks and offer effective content security to 2FA credentials sent via SMS, the authors propose an SMS encryption mechanism using a post quantic cryptosystem quasi-cyclic MDPC and an electronic signature of the OTPs. Finally, this article performs an implementation and a security analysis of the proposal.


Sign in / Sign up

Export Citation Format

Share Document