An efficient traceable access control scheme with reliable key delegation in mobile cloud computing
In this article the author talked about the conjoining mobile application and cloud computing for mobile devices as one ‘mobile could computing’. This granting user better service and benefits in term of storage space and safety of data. In the bid to eliminate security threat in mobile cloud computing the authors have proposed a traceable access control with the use of key and re-encryption to trace malicious users leak the decryption keys for profits and delegating authority to three part to better secure mobile cloud computing (MCC).
My opinion on this write up is a positive one, based on two factors. (1) Security, this cannot be over emphasized and need periodic update on how to secure data. (2) Is Finance, proving it’s more cost effective that the regular mobile cloud computing.
Bibliography
[1] Guan, Z., Li, J., Zhang, Y. et al. "An efficient traceable access control scheme with reliable key delegation in mobile cloud computing," J Wireless Com Network, vol. 2016, no. 208, pp. 1-11, Sep, 2016
Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators
Intelligent security IT system for detecting Intruders using RSSI was extensively explained in this paper, considering the broadness of security systems in information technology, access control systems is majorly carried out using tags to access building and because the tags can be obtained by intruders, this paper has explained an approach to counter the disadvantages of tags. It explained that the accuracy of intruder detection systems can be improved by focusing on the data for a specific resident based on demonstration-based l...
... middle of paper ...
...unications in an intelligible form, while still delivering content to the intended recipients. This paper gathered information from six write-ups from fifteen authors belonging to different countries and institutions. It summarizes recent developments and ideas on emerging communications security, with focus on privacy preserving, key distribution scheme, and digital image water marking.
One of the six paper gathered explained analysis and improvement of key distribution scheme for secure group communication as a scheme that guarantees forward and backward secrecy, prevents message modification and forgery during rekeying, requires sender verification, and therefore prevents MITM attacks in group communication.
Bibliography
[1] M. Zamani, I. Echizen, and A. H. Lashkari, “Innovations in Communications Security Aerospace Engineering,” vol. 2016, p. 3., July 2016
Sabu M. Thampi, Pradeep K. Atrey, Chun I. Fan, Gregorio Martinez Perez (Eds.), Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings (Communications in Computer and Information Science) (p. 418). New York, NY: Springer Publishing.
In the final part of Tele Health project, there are various aspects which we have to focus on. Tele Health services is already working successfully through remote connection, but it needs a server where it can store even large database, and it needs a security system also. Points mentioned below will be covered in this assignment.
In today’s society, smartphones have inevitably taken cellular phone sales by storm. Flip phones and home phones, with the classic 9 number keyboards, are being replaced with touch screens that allow for more interactive and advanced phones. The Apple iPhone and the Google Android are two examples of how technology is advancing the way we communicate. These smartphones, backed by each company’s unique business models, have changed the way cellular devices are used and sold.
Mobile devices have become an integral part of human-life in their day-to-day activities. According to recent studies it was mentioned that Mobile Cloud Computing (MCC) will be incorporated by most of the corporate and tele-communication sectors to meet their business requirements effectively. In MCC, the mobile devices will interact with the cloud across a network for providing required information to the user. Mobile devices can be any of smart phones, PDA’s, laptops, Tablet PC’s etc… Cloud can be defined as a data storage area where the data can be stored. This article provides overview of Mobile Computing, Cloud Computing, Mobile Cloud Computing, Challenges in MCC and Research areas in MCC.
Over the past several years the term cloud computing has become common in homes and organizations alike. Cloud computing can be defined as a pooled set of computing resources that are furnished via the internet. There are three types of cloud services typically available, these services are Platform as a Service (PaaS), Infrastructure as a Service (IaaS), and Software as a Service (SaaS). Organizations can benefit greatly from cloud services because they eliminate the need to buy and manage physical resources. Although such an action cuts cost it leaves organization victim to the vulnerabilities and threats that exist in cloud computing. Throughout this paper I will discuss the vulnerabilities and threats that come along with the adoption of cloud computing. In addition, I will discuss standards and policies that effectively manage the risk associated with cloud computing.
Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended. Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or perform various calculations on it.
Cloud Computing is an up and coming strategy that could create millions of jobs while allowing companies to become more profitable. How does Cloud Computing work? The basis of Cloud Computing is having data, software, platforms or networks stored and executed by an outside source and then streaming the output to your electronic device.(McKendrick, J. 2012 march 3) In this paper I will address the following three topics: the history and basis of Cloud Computing, the three main features of Cloud Computing, and the three network types used of Cloud Computing.
History of cloud computing The word "cloud" is used to represent the internet and other communications systems. Cloud computing is the result of an evolution of the widespread adoption of virtualization, service-oriented architecture, autonomic, and utility computing in the past, telecommunications companies mainly gave simply dedicated, point-to-point data circuits to their users. Starting in the 1990's, virtual private network services were included in their contributions. It made the telecommunication companies offer equally improved services, whereby cutting down on cost as well as using resources effectively. The term "cloud" represents the computing space between the provider and the end user.
[9]A. Rasheed and R. Mahapatra, “An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks,” Proc. IEEE 27th Int’l Performance Computing and Comm. Conf. (IPCCC ’08), pp. 264-270, Dec. 2008.
For thousands of years cryptography and encryption have been used to secure communication. Military communication has been the leader of the use of cryptography and the advancements. From the start of the internet there has been a greater need for the use of cryptography. The computer had been invented in the late 1960s but there was not a widespread market for the use of computers really until the late 1980s, where the World Wide Web was invented in 1989. This new method of communication has called for a large need for information security. The internet allows people to communicate sensitive information, and if received into the wrong hands can cause many problems for that person.
This paper is going to discuss wireless security from a broad view where I will go into why exactly wireless security is so important especially today as the ways in which we are communicating is changing dramatically. From there I will discuss the multiple wireless securities that are available to give a better understanding of the options given. Then I will go into why exactly not protecting your wireless can be so dangerous with some descriptions on the most dangerous wireless attacks out there today. Finally I will then discuss how we can better prepare for these types of attacks with a synopsis on several effective security methods that will help to ensure data is securely passed and kept hidden.
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including:
In this audit we have compared two operating system windows and android. android phones are more efficient then windows as it is an open source platform though it is unsecured , one can easilly modifiy the code.
With the increasingly ubiquitous nature of mobile devices and online availability, including smartphones and tablets, there is also an understandable concern about the level of security that is afforded to such devices. This can be considered as increasingly important given the proliferation of policies such as BYOD (Bring Your Own Device) which is being used by diverse organizations as a way of lowering the cost of ownership for such devices while also leveraging the flexibility advantages that their utilization can bring. It is therefore an area of immense interest due to the changing and emerging nature of both the technology itself as well as the security concerns.
Have you ever asked yourself, what the world would be like if there weren’t any mobile applications. Society is impacted by the new development in technology daily. Someone is always claiming that their inventions will revolutionize the world, but no invention has had more success over the years, in the cellular world than mobile applications. People all around the world use millions to billions of applications daily for personal and business uses. For example, social networking which is use by all generations of people. It has an influence the way we purchase cell phones, in order to have the capability. With the creation of different smartphones and tablets, comes the demand for more mobile applications. This causes competition among application builders. Mobile applications are designed to its user making their experience less complicated. Mobile applications have their advantages and disadvantages, depending on its design and designer. They can be created to be very simple or complex, depending on its intended function. Has society benefited from the usages of mobile applications or is it just a distraction. What impact do mobile applications have on society.