Secure Sensitive Data Sharing on a Big Data Platform Abstract? Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services. However, secure data sharing is problematic. This paper proposes a framework for secure…
Secure Two-Party differentially private data release for vertically partioned data Abstract?Secure Two-Party differentially private data release for vertically partioned data. Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among the existing privacy models, ?-differential privacy provides one of the strongest privacy guarantees. In this paper, we < Final...
Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware Abstract? Recently, malware has increasingly become a critical threat to embedded systems, while the conventional software solutions, such as antivirus and patches, have not been so successful in defending the ever-evolving and advanced malicious programs. we propose a hard ware enhanced architecture, GuardOL, to perform…
SEPIA: Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices Abstract? Credit card fraud is a common problem in today?s world. Financial institutions have registered major loses till today due to users being exposed of their credit card information. Shoulder-sur?ng or observation attacks, including card skimming and video recording with hidden cameras while users perform PIN-based…
Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing Abstract? Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing. Cloud computing is an emerging data interactive paradigm to realize users? data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the…
Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks Abstract? Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks. Denial-of-service (DoS) and distributed DoS < Final Year Projects 2016 > DDoS are among the major threats to cyber-security, and client puzzle, which demands a client to perform computationally expensive operations before being granted services from a server,…
STARS: A Statistical Traffic Pattern Discovery System for MANETs Abstract?STARS: A Statistical Traffic Pattern Discovery System for MANETs. Many anonymity enhancing techniques have been proposed based on packet encryption to protect the communication anonymity of mobile ad hoc networks (MANETs). However, in this paper, we show that MANETs are still vulnerable under passive statistical traffic…
Structural Vulnerability Assessment of Community-based Routing in Opportunistic Networks Abstract?Opportunistic networks enable mobile devices to communicate with each other through routes that are built dynamically, while messages are en route between the sender and the destination(s). The social structure and interaction of users of such devices dictate the performance of routing protocols in those networks….
To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks and Rule-Based Model Abstract? To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks and Rule-Based Model. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots…