Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext-policy attribute-based…

Read More

Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering

Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation Image encryption has to be conducted prior to image compression in many applications. This has led to the problem of how to design a pair of image encryption and compression algorithms such that compressing the encrypted images can still be efficiently performed. In this paper, we design a highly efficient image encryption-then-compression (ETC) system, where both lossless and lossy compression are considered. The proposed image encryption scheme operated in the prediction error domain is shown to be…

Read More

Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds

Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds Technology Used: Dot net A new decentralized access control scheme is proposed for secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user’s identity before storing data. Access control is enabled, in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. Authentication and access control scheme…

Read More

Supporting Privacy Protection in Personalized Web Search

Personalized web search (PWS) has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidences show that users’ reluctance to disclose their private information during search has become a major barrier for the wide proliferation of PWS. We study privacy protection in PWS applications that model user preferences as hierarchical user profiles. We propose a PWS framework called UPS that can adaptively generalize profiles by queries while respecting user specified privacy requirements. Our runtime generalization aims at striking a balance between two predictive metrics…

Read More