security module
Recently Published Documents


TOTAL DOCUMENTS

108
(FIVE YEARS 41)

H-INDEX

7
(FIVE YEARS 3)

Author(s):  
Ahmed EL-YAHYAOUI ◽  
Fouzia OMARY

Security and privacy are huge challenges in biometric systems. Biometrics are sensitive data that should be protected from any attacker and especially attackers targeting the confidentiality and integrity of biometric data. In this paper an extensive review of different physiological biometric techniques is provided. A comparative analysis of the various sus mentioned biometrics, including characteristics and properties is conducted. Qualitative and quantitative evaluation of the most relevant physiological biometrics is achieved. Furthermore, we propose a new framework for biometric database privacy. Our approach is based on the use of the promising fully homomorphic encryption technology. As a proof of concept, we establish an initial implementation of our security module using JAVA programming language.


2021 ◽  
pp. 100030
Author(s):  
Abdullah Ayub Khan ◽  
Asif Ali Laghari ◽  
Aftab Ahmed Shaikh ◽  
Mazhar Ali Dootio ◽  
Vania V. Estrela ◽  
...  

2021 ◽  
Author(s):  
Jinchun Choi ◽  
Bohyun Ahn ◽  
Swathi Pedavalli ◽  
Seerin Ahmad ◽  
Abigail Villasenor ◽  
...  

2021 ◽  
Author(s):  
M. M. Kamruzzaman

Abstract Smart cities use lightweight security module technologies like sixth-generation (6G) and wireless connections to improve people's quality of life. A smart city can use a networking model to power and monitor many geographically distributed networking models to support various applications like energy and resource management, intelligent transportation systems, and e-health. To manage smart city resources efficiently and intelligently, a significant state architecture must service various technologies due to the enormous development in networking models and the amount of data they generate. This research work presents a smart city networking architecture for smart city environments employing the lightweight security module (SCNM-LSM) in this work in progress article. It first offers a new conceptual framework termed the conventional model for activity off-loading and resource allocation. Second, it enhances the standard model by including off-loading and resource allocation awareness. It expands on the specific research topics to create and study the effectiveness of individual components with the previous models to accommodate technological improvements like the use of Artificial Intelligence (AI) in the sixth generation data transmission technology.


2021 ◽  
Vol 2096 (1) ◽  
pp. 012047
Author(s):  
V Kh Fedorov ◽  
E G Balenko ◽  
S I Shterenberg ◽  
A V Krasov

Abstract For more than a decade, the scientific community has been developing various models of insider actions in the trusted-zone information system and methods for identifying such. All those years, they have been facing the challenge of finding quality data samples for analysis and testing, and it is the availability of reliable data on the attack that is crucial for any research or detection of attempts to steal or compromise legal software. Unfortunately, collection of such samples remains nearly impossible despite some attempts to do so. Any data on incidents is either incomplete or inaccurate, or is not available at all. Software developers also face lack of resources, including time. Developers do not have enough time, funding, material resources, or qualifications to make a sturdy security system, which is why they need to use third-party automations that dock a security module to the compiled program. The strength of this approach is that such a system can be embedded in any software, whereas the weakness is that the method is "one-size-fits-all". Standard protections span across multiple programs, which results in a higher chance of being hacked.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Conggui Yuan ◽  
Xin Zheng ◽  
Bo Rao ◽  
Shuting Cai

Information security is fundamental to the Internet of things (IoT) devices, in which security chip is an important means. This paper proposes an Advanced High-performance Bus Slave Control IP (AHB-SIP), which applies to cryptographic accelerators in IoT security chips. Composed by four types of function registers and AHB Interface Control Logic (AICL), AHB-SIP has a simple and easy-to-use structure. The System on Chip (SoC) design can be realized by quickly converting the nonstandard interface of the security module to the AHB slave interface. AHB-SIP is applied to the security accelerators of SM2, SM3, and SM4 and random number generator (RNG). Combined with a low-power embedded CPU, TIMER, UART, SPI, IIC, and other communication interfaces, a configurable SoC can be integrated. Moreover, SMIC 110 nm technology is employed to tape out the SoC on a silicon chip. The area of AHB-SIP is 0.072 mm2, only occupying 6‰ of the chip (3.45 ∗ 3.45 mm2), and the power consumption of encryption modules combined with AHB-SIP is lower than that combined with AXI interface, which is decreased up to 61.0% and is ideal for the application of IoT.


2021 ◽  
Author(s):  
Bohyun Ahn ◽  
Gomanth Bere ◽  
Seerin Ahmad ◽  
Jinchun Choi ◽  
Taesic Kim ◽  
...  

2021 ◽  
Vol 2021 (9) ◽  
pp. 36-42
Author(s):  
Nataliya Kuznetsova ◽  
Tatyana Karlova ◽  
Aleksandr Bekmeshov

The purpose of the scientific work is to build a scheme for the interaction of modules of an automated system for integrated protection of strategically important resources of an enterprise, in particular, a transportation industry enterprise. To ensure a high efficiency of the presented system, efficient allocation between the modules is necessary for the protection functions. Within the framework of this task, the article presents sets of functions for each security module. The outstanding feature of the work is the proposed scheme of optimal interaction of the modules of the automated system of integrated protection of strategically important resources of the enterprise. The article considers the mechanism of isolation of "affected" resources (and modules) of the main automated control systems of a transportation enterprise, consisting of the sequential execution of the functions of forming "affected zones and quarantine", the function of redirecting datastream. The paper presents a structural diagram of the interaction of modules of an automated system for integrated protection of strategically important enterprise resources, sets of functions for each module are formed, a scheme for ensuring isolation of "affected" resources is presented, the main difficulties of implementing an automated system are described, in particular, the features of its implementation at the transportation industry enterprise connected with the client-server architecture of the main AS, a number of additional organizational and technical measures for protecting strategically important enterprise resources are proposed.


Nutrients ◽  
2021 ◽  
Vol 13 (7) ◽  
pp. 2304
Author(s):  
Susana L Matias ◽  
Jazmin Rodriguez-Jordan ◽  
Mikelle McCoin

Food insecurity is an emerging issue for college students. A nutrition course with an integrated teaching kitchen was developed to address this issue at a large public university. We aimed to determine changes in food insecurity and stress among students who took the course. The course consisted of weekly lectures followed by teaching kitchen lab sessions to teach basic nutrition and culinary concepts and expose students to hands-on skill development cooking experiences. Using a pre-post design, enrolled students completed an anonymous online survey at the beginning and the end of the semester. Food security was assessed with the USDA Six-Item Food Security Module; stress was measured using the Perceived Stress Scale (PSS). Pre- and post-data were linked for 171 participants. Paired data statistical analysis comparing the post- vs. the pre-test showed an increase in food security and a decrease in very low security rates (from 48% to 70%, and from 23% to 6%, respectively; p < 0.0001), and a decrease on the average PSS score, indicating lower stress (from (Mean ± SD) 19.7 ± 5.9 to 18.1 ± 6.0; p = 0.0001). A nutrition and culinary course may be an effective response to food insecurity and could potentially improve students’ wellbeing.


2021 ◽  
Author(s):  
Ahmed Bentajer ◽  
Mustapha Hedabou ◽  
Sara Ennaama ◽  
Abderrahim Tahiri

The aim of this paper is to propose a model to strengthen the security of key management in cloud computing, where the model is shared or entirely controlled by a non-trusted third party provider. Key management is not a straightforward matter for IT-teams, in addition to critical issues related to properly managing and securing the keys on providers’ infrastructures, they have to deal with concerns specific to multi-cloud key management. Hardware Security Module (HSM) solution that offers a secure on-premise encryption key management turned out be impracticable for widespread cloud deployment. HSM as a Service seems to be the best approach for key management in multi-cloud, but the service is wholly owned and managed by another cloud provider. In This paper, we present an efficient and secure cloud key management that fulfills the requirements of multi-cloud deployment. The proposed design splits the key into a blinded version of n shares that will be stored in encrypted format at the cloud provider side. To demonstrate the efficiency of the proposed design, we implement a fully featured prototype and evaluate its performance. Results analysis shows that the proposed design is highly efficient and can serve as a groundwork for using secret share as a way to protect keys in a multi-cloud environment.


Sign in / Sign up

Export Citation Format

Share Document