Loading...
Search for: data-security
0.011 seconds
Total 25 records

    Computer Networks and Distributed Systems: International Symposium, CNDS 2013 Tehran, Iran, December 25–26, 2013 Revised Selected Papers

    , Article Communications in Computer and Information Science ; Vol. 428, issue , December , 2014 ; 18650929 ; 978-3-319-10902-2 Jahangir, A. H ; Movaghar, A ; Asadi, H ; Sharif University of Technology
    Abstract
    [No abstract available]  

    A Method for Searching on Encrypted Data

    , M.Sc. Thesis Sharif University of Technology Mansoori, Fatemeh (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Using database encryption to protect data in some situations where access control is not soleley enough is inevitable. Database encryption provides an additional layer of protecton to conventional access control techniques. It prevents unauthorized users, including intruders breaking into a network, from viewing the sensitive data. As a result data remains protected even in the event that database is successfully attacked or stolen. However, encryption and decryption of data result in database performance degradation. In the situation where all the information is stored in encrypted form, one cannot make the selection on the database content any more. Data should be decrypted first, so an... 

    Robustness Evaluation of Key Management Against Attacks in Wireless Sensor Network

    , M.Sc. Thesis Sharif University of Technology Hosseini Pour, Ahmad Reza (Author) ; Jahangir, Amir Hossein (Supervisor)
    Abstract
    Wireless sensor networks (WSNs) are composed of many independent spatially-distributed sensor nodes where communicate their information acquired from environment to shape a uniform view of their managed scope. Using WSNs in places which human can hardly attend uninterruptedly, as well as constraints such as low power consumption, low price, small size, and limited radio range, are the biggest challenges for researchers and WSN designers. Supplying security is yet another common challenge of using these networks. The beginning chapters of this dissertation introduce the most important security mechanisms in WSNs, that is, key management and cryptography. Since each application has its own... 

    Detection of Forgeries in Moving Objects in Digital Video

    , M.Sc. Thesis Sharif University of Technology Bidokhti, Amir (Author) ; Ghaemmaghami, Shahrokh (Supervisor)
    Abstract
    This project aims at forgery detection in digital videos. Most of existing methods are based on similar methods for image forgery detection. Therefore, they do not have sufficient accuracy in case of video forgery detection. In this project, we focus on local copy/move attacks in digital videos and propose 3 solutions for 3 problems in this field: 1) detection of copy/move along time axis (temporal copy/move), 2) detection of copy/move along x and y axes (spatial copy/move) and 3) detection of original and fake part in case of finding a duplication. For each of these 3 problems a feature extraction algorithm and a forgery detection algorithm are proposed. Feature extraction algorithms are... 

    HYSA: HYbrid steganographic approach using multiple steganography methods

    , Article Security and Communication Networks ; Volume 4, Issue 10 , OCT , 2011 , Pages 1173-1184 ; 19390114 (ISSN) Sajedi, H ; Jamzad, M ; Sharif University of Technology
    John Wiley and Sons Inc  2011
    Abstract
    The aim of image steganography is to hide data in an image with visual and statistical invisibility. There have been a number of steganography techniques proposed over the past few years. In sequence, the development of these methods has led to an increased interest in steganalysis techniques. Most of the steganalysis methods attempt to estimate cover image statistics. One way to provide a secure steganography method is to disturb the estimation of steganalyzers. The main concern of this paper is to resist against steganalysis methods and utilize a mechanism to securely embed more secret data into an image. We present HYbrid steganographic approach (HYSA), which embeds secret data with... 

    Improving data protection in BSS based secure communication: mixing matrix design

    , Article Wireless Networks ; Volume 27, Issue 7 , 2021 , Pages 4747-4758 ; 10220038 (ISSN) Aslani, M. R ; Shamsollahi, M. B ; Nouri, A ; Sharif University of Technology
    Springer  2021
    Abstract
    Abstract: In this paper, a secure and efficient Blind Source Separation (BSS) based cryptosystem is presented. The use of BSS in audio and image cryptography in wireless networks has attracted more attention. A BSS based cryptosystem consists of three main parts: secret data, secret keys, and mixing matrix. In this paper, we propose a new design to create a proper mixing matrix in BSS based cryptosystem. We offer a mathematical criterion to select mixing matrix elements before encryption. The proposed criterion gives a simple way to attach the secret sources to keys, which makes source separation very hard for the adversary. Versus, we show that using the random mixing matrix can lead to... 

    Semantic Approach to Privacy Protection in Social Networks

    , M.Sc. Thesis Sharif University of Technology Raja, Mohammad Mahdi (Author) ; Sadighi Moshkenani, Mohsen (Supervisor)
    Abstract
    Social network is a map of relationships among individuals or organizations. With the development of social network sites (SNS), security protection of private information online has been a serious and important research topic. Information in social networks is online all the time and available to a large number of visitors. The main problem in current SNSs is that, people are not able to define different categories for their relations and then they cannot have good self-defined privacy policies. Also default policies cannot satisfy different environments and cultures and will serve information to strangers. After that different social networks with different interfaces are not... 

    A Semantic-Aware Authorization Model Based on Deontic Logic

    , Ph.D. Dissertation Sharif University of Technology Amini, Morteza (Author) ; Jalili, Rasoul (Supervisor)
    Abstract
    Semantic technology provides an abstraction layer above existing computational environments, especially the Web, to give information a well-defined meaning. Moving toward semantic-aware environments imposes new security requirements. One of the most important requirement is the authorization and security policy inference based on the existing semantic relationships in the abstract (conceptual) layer. Most of the authorization models proposed for these environments so far are incomplete and their inference rules are not guaranteed to be consistent, sound, and complete. To have a sound and complete system for policy specification and inference, in this thesis, a family of modal logics, called... 

    A Survey on Searchable Symmetric Encryption Schemes

    , M.Sc. Thesis Sharif University of Technology Sajadieh, Zahra Sadat (Author) ; Khazaei, Shahram (Supervisor)
    Abstract
    Using “Searchable Encryption” enables us to encrypt the data, while preserving the possibility of running search queries. One of the most important applications of the mentioned is in Cloud Storage. As users do not trust the Cloud space, they are not inclined to store their data on the Could. The solution to this problem is of course, Cryptography. However, ordinary Cryptography methods, eliminate the data’s searchability. Hence, we need encryption schemes that code the data while retaining their searchability. So far, various schemes has been proposed that differ in their performance, security level, and usage. In this thesis, we aim to discuss and analyze these methods  

    Integrity Checking of Outsourced Computations with Distributed Data Sources

    , Ph.D. Dissertation Sharif University of Technology Dolatnezhad, Somayeh (Author) ; Amini, Morteza (Supervisor)
    Abstract
    In recent years, one of the research interests is ensuring the integrity of computations done on data received from multiple data sources. Limited research has been done to ensure the integrity of computations that the output depends on data generated by different data sources. However, there are many solutions for systems that the input data is generated by a single data source. In this thesis, ensuring the integrity of multi-source aggregate functions and general functions are investigated in an untrusted server. To verify the integrity of aggregate functions, first of all, we present a construction for verifying the results of linear functions using the RSA signature. It should be noted... 

    Encryption Aware Query Processing for Data Outsourcing

    , Ph.D. Dissertation Sharif University of Technology Ghareh Chamani, Javad (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Data outsourcing provides cost-saving and availability guarantees. However, privacy and confidentiality issues, disappoint owners from outsourcing their data. Although solutions such as CryptDB and SDB tried to provide secure and practical systems, their enforced limitations, made them useless in practice. Inability in search on encrypted data, is one of the most important existing challenges in such systems. Furthermore, the overhead of mechanisms such as FHEs, removes them from considering for any practical system. Indeed, special purpose encryptions would be the only usable mechanisms for such purposes. However, their limited functionality does not support some important required... 

    Using contourlet transform and cover selection for secure steganography

    , Article International Journal of Information Security ; Volume 9, Issue 5 , October , 2010 , Pages 337-352 ; 16155262 (ISSN) Sajedi, H ; Jamzad, M ; Sharif University of Technology
    2010
    Abstract
    In this paper, we present a new adaptive contourlet-based steganography method that hides secret data in a specific or automatically selected cover image. Our proposed steganography method primarily decomposes the cover image by contourlet transform. Then, every bit of secret data is embedded by increasing or decreasing the value of one coefficient in a block of a contourlet subband. Contourlet coefficients are manipulated relative to their magnitudes to hide the secret data adaptively. In addition to proposing contourlet-based steganography method, this work investigates the effect of cover selection on steganography embedding and steganalysis results. We demonstrate, through the... 

    Secure communication and archiving of low altitude remote sensing data using high capacity fragile data hiding

    , Article Multimedia Tools and Applications ; 2018 ; 13807501 (ISSN) Akhtarkavan, E ; Majidi, B ; Manzuri, M. T ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    Fragile data hiding has been extensively used for secure transmission of the sensitive data using cover images, audios and videos. In the past decade, increasingly the remote sensing applications require transmission and archiving of large number of aerial images and videos. Storage and processing of remote sensing data in the public cloud computing and storage platforms, with servers outside the control of the data owners, requires sufficient attention to persevering the privacy of the data. Furthermore, in the past few years the applications of drones and unmanned aerial vehicles demand algorithms designed especially for low altitude remote sensing data. In this paper, a novel fragile data... 

    Secure communication and archiving of low altitude remote sensing data using high capacity fragile data hiding

    , Article Multimedia Tools and Applications ; Volume 78, Issue 8 , 2019 , Pages 10325-10351 ; 13807501 (ISSN) Akhtarkavan, E ; Majidi, B ; Manzuri, M. T ; Sharif University of Technology
    Springer New York LLC  2019
    Abstract
    Fragile data hiding has been extensively used for secure transmission of the sensitive data using cover images, audios and videos. In the past decade, increasingly the remote sensing applications require transmission and archiving of large number of aerial images and videos. Storage and processing of remote sensing data in the public cloud computing and storage platforms, with servers outside the control of the data owners, requires sufficient attention to persevering the privacy of the data. Furthermore, in the past few years the applications of drones and unmanned aerial vehicles demand algorithms designed especially for low altitude remote sensing data. In this paper, a novel fragile data... 

    A context-aware access control model for pervasive computing environments

    , Article 2007 International Conference on Intelligent Pervasive Computing, IPC 2007, Jeju Island, 11 October 2007 through 13 October 2007 ; 2007 , Pages 51-56 ; 0769530060 (ISBN); 9780769530062 (ISBN) Emami, S. S ; Amini, M ; Zokaei, S ; Sharif University of Technology
    2007
    Abstract
    In pervasive computing environments, a user can access resources and services from any where and at any time; thus a key security challenge in these environments is the design of an effective access control model which is aware of context modifications. Changes in context may trigger changes in authorizations. In this paper, we propose a new context-aware access control model based on role-based access control model for pervasive computing environments. We assign roles to users dynamically based on the long-term context information and tune active role's permissions according to the short-term context information of the users and environment. © 2007 IEEE  

    Analysis and Optimization of the Electronic Health System Using the Blockchain

    , M.Sc. Thesis Sharif University of Technology Javan, Reza (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    The electronic health system plays a crucial role in modern healthcare, facilitating efficient data management, secure information exchange, and improved patient care. However, existing systems often face challenges related to security, privacy, scalability, and interoperability. The primary objectives of this study are proposing a system that ensures data security, patient and peer privacy, scalability, data integrity, deniability, traceability, secure data sharing, access control, transparency, real-time monitoring, and security in the drug supply chain. To achieve these objectives, we have proposed a system that encompasses a wide range of requirements of healthcare system. To enhance... 

    Verification of OSPF vulnerabilities by colored petri net

    , Article SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks ; November , 2013 , Pages 102-109 ; 9781450324984 (ISBN) Niari, S. T ; Jahangir, A. H ; Sharif University of Technology
    2013
    Abstract
    Routers and routing protocols are critical parts of a network infrastructure. OSPF is one of the most important routing protocols, and therefore its vulnerabilities can be very destructive. This makes its security analysis critical. There are many reported and potential vulnerabilities in OSPF protocol. Considering the complexity and the ambiguity of its description in RFC 2328, it is very valuable to design a formal model of the protocol and analyze the vulnerabilities of its critical parts. In this paper, some challenging parts of OSPF protocol along with attack scenarios are modeled by means of Colored Petri Net in CPN Tools environment. Then, the reported vulnerabilities are analyzed by... 

    A novel approach for secure and fast generation of RSA public and private keys on SmartCard

    , Article Proceedings of the 8th IEEE International NEWCAS Conference, NEWCAS2010, 20 June 2010 through 23 June 2010 ; June , 2010 , Pages 265-268 ; 9781424468058 (ISBN) Bahadori, M ; Mali, M. R ; Sarbishei, O ; Atarodi, M ; Sharifkhani, M ; IEEE CAS Society ; Sharif University of Technology
    2010
    Abstract
    RSA based SmartCards have been widely used in security services such as secure data transmission in many applications over the past few years. Generation of a secure key pair which is based on finding a pair of large prime numbers is an indispensable part of creating a secure channel. This paper describes a novel approach for secure and fast key generation of the public key cryptographic algorithm of RSA. This method has been implemented on a typical SmartCard equipped with a crypto-coprocessor and a true random number generator. An efficient method for generating the large random prime numbers is proposed that considerably reduces the total time required for generating a key pair. The key... 

    A context-aware mandatory access control model for multilevel security environments

    , Article 27th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2008, Newcastle upon Tyne, 22 September 2008 through 25 September 2008 ; Volume 5219 LNCS , 2008 , Pages 401-414 ; 03029743 (ISSN); 3540876979 (ISBN); 9783540876977 (ISBN) Jafarian, J. H ; Amini, M ; Jalili, R ; Sharif University of Technology
    2008
    Abstract
    Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments like military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes may be required in some environments. Moreover, as computing technology becomes more pervasive, flexible access control mechanisms are needed. Unlike traditional approaches for access control, such access decisions depend on the combination of the required credentials of users and the context of the system. Incorporating context-awareness into mandatory access control models results in a... 

    On the power of power analysis in the real world: A complete break of the KeeLoq code hopping scheme

    , Article 28th Annual International Cryptology Conference, CRYPTO 2008, Santa Barbara, CA, 17 August 2008 through 21 August 2008 ; Volume 5157 LNCS , 2008 , Pages 203-220 ; 03029743 (ISSN) ; 3540851739 (ISBN); 9783540851738 (ISBN) Eisenbarth, T ; Kasper, T ; Moradi, A ; Paar, C ; Salmasizadeh, M ; Manzuri Shalmani, M. T ; Sharif University of Technology
    2008
    Abstract
    KeeLoq remote keyless entry systems are widely used for access control purposes such as garage openers or car door systems. We present the first successful differential power analysis attacks on numerous commercially available products employing KeeLoq code hopping. Our new techniques combine side-channel cryptanalysis with specific properties of the KeeLoq algorithm. They allow for efficiently revealing both the secret key of a remote transmitter and the manufacturer key stored in a receiver. As a result, a remote control can be cloned from only ten power traces, allowing for a practical key recovery in few minutes. After extracting the manufacturer key once, with similar techniques, we...