SECURE SOLUTION FOR MOBILE ACCESS TO PATIENT?S HEALTHCARE RECORDS Abstract?Mobile devices are today widely accepted and their capability to provide access to services independent of user time and location make them well suited for provision of healthcare services to both patients and healthcare personnel. However, mobile services are still not generally allowed to operate with…
Secure Transmission in Cooperative Relaying Networks With Multiple Antennas Abstract? The secrecy performance of dual-hop amplify-and-forward multi-antenna relaying systems over Rayleigh fading channels, considering the direct link between the source and the destination. In order to exploit the available direct link and the multiple antennas for secrecy improvement, different linear processing schemes at the relay…
Secure Two-Party differentially private data release for vertically partioned data Abstract?Secure Two-Party differentially private data release for vertically partioned data. Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among the existing privacy models, ?-differential privacy provides one of the strongest privacy guarantees. In this paper, we < Final...
R3E: Secure, Efficient and Fine-Grained Data Access Control Mechanism for P2P Storage Cloud Abstract?Abstract By combining cloud computing and Peer-to-Peer computing, a P2P storage cloud can be formed to offer highly available storage services, lowering the economic cost by exploiting the storage space of participating users. However, since cloud severs and users are usually outside…
SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks Abstract-Wireless network dynamically allocates channel resources to improve spectral efficiency and, to avoid collisions, has its users cooperate with each other using a medium access control (MAC) protocol. However, MAC assumes user compliance and can be detrimental when a user misbehaves. An attacker who compromised…
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption Abstract? Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption. The provisioning of basic security mechanisms such as authentication and confidentiality is highly challenging in a content-based publish/subscribe system. Authentication of publishers and subscribers is difficult to achieve due to the loose coupling of publishers and subscribers. Likewise, confidentiality of…
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption Abstract? SThe provisioning of basic security mechanisms such as authentication and confidentiality is highly challenging in a content-based publish/subscribe system. Authentication of publishers and subscribers is difficult to achieve due to the loose coupling of publishers and subscribers. Likewise, confidentiality of events and subscriptions conflicts with content-based…
Securing Cloud Data under Key Exposure Abstract-Recent news reveal a powerful attacker which breaks data confidentiality by acquiring cryptographic keys, by means of coercion or backdoors in cryptographic software. Once the encryption key is exposed, the only viable measure to preserve data confidentiality is to limit the attacker?s access to the ciphertext. This may be…
Securing Cognitive Radio Networks against Primary User Emulation Attacks Abstract? Securing Cognitive Radio Networks against Primary User Emulation Attacks. Securing Cognitive Radio Networks against Primary User Emulation Attacks. Cognitive Radio (CR) is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for…
Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis Abstract?With the rapid development of reputation systems in various online social networks, manipulations against such systems are evolving quickly. In this paper, we propose scheme TATA, the abbreviation of joint Temporal And Trust Analysis, < Final Year Projects >which protects reputation systems from a…
Securing Services in Networked Cloud Infrastructures Abstract?we propose techniques and architecture for securing services that are hosted in a multi-tenant networked cloud infrastructures. Our architecture is based on trusted virtual domains and takes into account both security policies of the tenant domains. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source…
Securing the Backpressure Algorithm for Wireless Networks Abstract-In the first place, the backpressure algorithm is known to provide throughput optimality in routing and scheduling decisions for multi-hop networks with dynamic traffic. The essential assumption in the backpressure algorithm is that all nodes are benign and obey the algorithm rules governing the information exchange and underlying…