This paper proposes the first secure and distributed data discovery and dissemination protocol named DiDrip. It allows the network owners to authorize multiple network users with different privileges to simultaneously and directly disseminate data items to the sensor nodes. Moreover, as demonstrated by our theoretical analysis, it addresses a number of possible security vulnerabilities that […]
A NOVEL SECURE AND DISTRIBUTED DATA DISCOVERY AND DISSEMINATION PROTOCOL IN WSN
The need of distributed data discovery and dissemination protocols is not completely new, but previous work did not address this need. We study the functional requirements of such protocols, and set their design objectives. Also, we identify the security vulnerabilities in previously proposed protocols. Based on the design objectives, we propose DiDrip. It is the […]
MINING E-COMMERCE FEEDBACK COMMENTS FOR COMPUTING MULTI-DIMENSIONAL TRUST
We propose Comment-based Multi-dimensional trust (CommTrust), a fine-grained multi-dimensional trust evaluation model by mining e-commerce feedback comments. With CommTrust, comprehensive trust profiles are computed for sellers, including dimension reputation scores and weights, as well as overall trust scores by aggregating dimension reputation scores. To the best of our knowledge, CommTrust is the first piece of […]
VERIFIABLE ATTRIBUTE-BASED KEYWORD SEARCH OVER OUTSOURCED ENCRYPTED DATA
In this abstract propose a novel cryptographic solution , called verifiable attribute-based keyword search ( VABKS ). The solution allows a data user, whose credentials satisfy a data owner’s access control policy, to (i) search over the data owner’s outsourced encrypted data, (ii) outsource the tedious search operatio ns to the cloud, and (iii) verify […]
SOURCE PRIVACY WITH HOP-BY-HOP MESSAGE AUTHENTICATION IN WIRELESS SENSOR NETWORKS
Message authentication plays a key role in thwarting unauthorized and corrupted messages from being forwarded in networks to save the precious sensor energy. For this reason, many authentication schemes have been proposed in literature to provide message authenticity and integrity verification for wireless sensor networks. In this abstract, we propose an unconditionally secure and efficient […]
VABKS OVER OUTSOURCED ENCRYPTED DATA
Cloud computing allows data owners to use massive data storage and vast computation capabilities at a very low price. Despite the benefits, data outsourcing deprives data owners of direct control over their outsourced data. It is common nowadays for data owners to outsource their data to the cloud. Since the cloud cannot be fully trusted, […]
WIRELESS SENSOR NETWORKS WITH HOP-BY-HOP MESSAGE AUTHENTICATION AND SOURCE PRIVACY
In this abstract, we propose an unconditionally secure and efficient source anonymous message authentication (SAMA) scheme based on the optimal modified ElGamal signature (MES) scheme on elliptic curves. This MES scheme is secure against adaptive chosen-message attacks in the random oracle model. Our scheme enables the intermediate nodes to authenticate the message so that all […]
PRIVATE MATCHING PROTOCOLS BASED ON ASYMMETRIC SOCIAL PROXIMITY FOR ONLINE SOCIAL NETWORKS
In OSNs and Mobile Social Networks (MSNs), many distributed solutions to privately finding the social proximity between two users have been proposed in this abstract. The most common way of determining friendship between two people is through profile matching, i.e. finding out if they have common profile attributes, like interests, symptoms, or some other social […]
ONLINE SOCIAL NETWORKS USING ASYMMETRIC SOCIAL PROXIMITY BASED PRIVATE MATCHING PROTOCOLS
Online Social Networks have redefined the way people interact with existing friends, and more importantly, make new friends. In particular, people can now explore potential friendships via OSNs, by looking for common interests, friends, and symptoms, close geographic proximity, etc., between each other. In this abstract, we leverage community structures to redefine the OSN model […]
BROKER-LESS PUBLISH/SUBSCRIBE SYSTEMS WITH IDENTITY-BASED ENCRYPTION
In publish/subscribe (pub/sub) communication, Publishers inject information into the pub/sub system, and subscribers specify the events of interest by means of subscriptions. Published events are routed to their relevant subscribers, without the publishers knowing the relevant set of subscribers, or vice versa. This abstract presents a novel approach to provide confidentiality and authentication in a […]
- « Previous Page
- 1
- 2
- 3
- 4
- …
- 8
- Next Page »