In publish/subscribe (pub/sub) communication, Publishers inject information into the pub/sub system, and subscribers specify the events of interest by means of subscriptions. Published events are routed to their relevant subscribers, without the publishers knowing the relevant set of subscribers, or vice versa. This abstract presents a novel approach to provide confidentiality and authentication in a […]
RELATIONAL DATA WITH ACCURACY-CONSTRAINED PRIVACY-PRESERVING ACCESS CONTROL FRAMEWORK
The concept of privacy-preservation for sensitive data can require the enforcement of privacy policies or the protection against identity disclosure by satisfying some privacy requirements. In this abstract, we investigate privacy-preservation from the anonymity aspect. The sensitive information, even after the removal of identifying attributes, is still susceptible to linking attacks by the authorized users. […]
A NOVEL ARCHITECTURE FOR INTEGRATES CLOUD DATABASE SERVICES WITH DATA CONFIDENTIALITY AND EXECUTING CONCURRENT OPERATIONS ON ENCRYPTED DATA
In this abstract, we propose SecureDBaaS as the first solution that allows cloud tenants to take full advantage of DBaaS qualities, such as availability, reliability, and elastic scalability, without exposing unencrypted data to the cloud provider. The architecture design was motivated by a threefold goal: to allow multiple, independent, and geographically distributed clients to execute […]
SUPPORTING PRIVACY PROTECTION IN PROFILE-BASED PERSONALIZED WEB SEARCH
Personalized web search (PWS) is a general category of search techniques aiming at providing better search results, which are tailored for individual user needs. As the expense, user information has to be collected and analyzed to figure out the user intention behind the issued query. The solutions to PWS can generally be categorized into two […]
SYSTEMATIC AND PRACTICAL PERFORMANCE ANALYSIS FRAMEWORK USING MODELING OF DFS
Distributed File System (DFS) is a set of client and server services that allow an organization using Microsoft Windows servers to organize many distributed SMB file shares into a distributed file system. DFS provides location transparency and redundancy to improve data availability in the face of failure or heavy load by allowing shares in multiple […]
RISK OF UNKNOWN VULNERABILITIES MEASUREMENT USING K-ZERO DAY SAFETY
This metric then simply counts how many zero-day vulnerabilities are required to compromise a network asset. A larger count will indicate a relatively more secure network, because the likelihood of having more unknown vulnerabilities all available at the same time, applicable to the same network, and exploitable by the same attacker, will be lower. It […]
SERVICE-ORIENTED MOBILE SOCIAL NETWORKS USING SYBIL-RESISTED TSE
Mobile social networking is social networking where individuals with similar interests converse and connect with one another through their mobile phone and/or tablet. In this paper, propose a Trustworthy Service Evaluation (TSE) system to enable users to share service reviews in service-oriented mobile social networks (S-MSNs). Each service provider independently maintains a TSE for itself, […]