14 research outputs found

    Data auditing and security in cloud computing: issues, challenges and future directions

    Get PDF
    Cloud computing is one of the significant development that utilizes progressive computational power and upgrades data distribution and data storing facilities. With cloud information services, it is essential for information to be saved in the cloud and also distributed across numerous customers. Cloud information repository is involved with issues of information integrity, data security and information access by unapproved users. Hence, an autonomous reviewing and auditing facility is necessary to guarantee that the information is effectively accommodated and used in the cloud. In this paper, a comprehensive survey on the state-of-art techniques in data auditing and security are discussed. Challenging problems in information repository auditing and security are presented. Finally, directions for future research in data auditing and security have been discusse

    Data Auditing and Security in Cloud Computing: Issues, Challenges and Future Directions

    Get PDF
    Cloud computing is one of the significant development that utilizes progressive computational power and upgrades data distribution and data storing facilities. With cloud information services, it is essential for information to be saved in the cloud and also distributed across numerous customers. Cloud information repository is involved with issues of information integrity, data security and information access by unapproved users. Hence, an autonomous reviewing and auditing facility is necessary to guarantee that the information is effectively accommodated and used in the cloud. In this paper, a comprehensive survey on the state-of-art techniques in data auditing and security are discussed. Challenging problems in information repository auditing and security are presented. Finally, directions for future research in data auditing and security have been discussed

    Advances in signatures, encryption, and E-Cash from bilinear groups

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2006.Includes bibliographical references (p. 147-161).We present new formal definitions, algorithms, and motivating applications for three natural cryptographic constructions. Our constructions are based on a special type of algebraic group called bilinear groups. 1. Re-Signatures: We present the first public key signature scheme where a semi-trusted proxy, given special information, can translate Alice's signature on a message into Bob's signature on the same message. The special information, however, allows nothing else, i.e., the proxy cannot translate from Bob to Alice, nor can it sign on behalf of either Alice or Bob. We show that a path through a graph can be cheaply authenticated using this scheme, with applications to electronic passports. 2. Re-Encryption: We present the first public key cryptosystem where a semi-trusted proxy, given special information, can translate an encryption of a message under Alice's key into an encryption of the same message under Bob's key. Again, the special information allows nothing else, i.e. the proxy cannot translate from Bob to Alice, decrypt on behalf of either Alice or Bob, or learn anything else about the message. We apply this scheme to create a new mechanism for secure distributed storage.(cont.) 3. Compact; E-Cash with Tracing and Bounded-Anonymity: We present an offline e-cash system where 2 coins can be stored in O(e + k) bits and withdrawn or spent in 0(f + k) time, where k is the security parameter. The best previously known schemes required at least one of these complexities to be 0(2t . k). In our system, a user's transactions are anonymous and unlinkable, unless she performs a forbidden action, such as double-spending a coin. Performing a forbidden action reveals the identity of the user, and optionally allows to trace all of her past transactions. We provide solutions without using a trusted party. We argue why features of our system are likely to be crucial to the adoption of any e-cash system.by Susan Hohenberger.Ph.D

    CPA\u27s handbook of fraud and commercial crime prevention

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/1823/thumbnail.jp

    EU Business Law and Digital Revolution : Selected Studies from New Fields of Technology

    Get PDF
    The first chapter (I. Artificial Intelligence: legal implications) reflects on the growing importance of using artificial intelligence and the role of the legal regulation. The articles pose questions form general as well as specific perspectives and illustrates the legal problems of the artificial intelligence by varieties of topics, from the public procurements to the supply chains. The second chapter collects the papers that are focusing on the new instruments of exchange (II. Cryptocurrencies). The chapter lays down the conceptual basis of cryptocurrencies and examines the legal and regulatory challenges arising from the current use and the probable future prevalence of the virtual currencies. The third chapter of the book pays attention to emerging fields of regulations (III. Business and digitalization). The papers examine the adoption of technological innovations in higher education, e-commerce related aspects of computer games, legal challenges of smart contracts and autonomous vehicles

    Legal and regulatory aspects of mobile financial services

    Get PDF
    The thesis deals with the emergence of bank and non-bank entities that provide a range of unique transaction-based payment services broadly called Mobile Financial Services (MFS) to unbanked, underserved and underbanked persons via mobile phones. Models of MFS from Mobile Network Operators (MNOs), banks, combinations of MNOs and banks, and independent Mobile Financial Services Providers are covered. Provision by non-banks of ‘bank-type’ services via mobile phones has been termed ‘transformational banking’ versus the ‘additive banking’ services from banks. All involve the concept of ‘branchless banking’ whereby ‘cash-in/cash out’ services are provided through ‘agents.’ Funds for MFS payments may available through a Stored Value Product (SVP), particularly through a Stored Value Account SVP variant offered by MNOs where value is stored as a redeemable fiat- or mobile ‘airtime’-based Store of Value. The competitive, legal, technical and regulatory nature of non-bank versus bank MFS models is discussed, in particular the impact of banking, payments, money laundering, telecommunications, e-commerce and consumer protection laws. Whether funding mechanisms for SVPs may amount to deposit-taking such that entities could be engaged in the ‘business of banking’ is discussed. The continued use of ‘deposit’ as the traditional trigger for the ‘business of banking’ is investigated, alongside whether transaction and paymentcentric MFS rises to the ‘business of banking.’ An extensive evaluation of ‘money’ based on the Orthodox and Claim School economic theories is undertaken in relation to SVPs used in MFS, their legal associations and import, and whether they may be deemed ‘money’ in law. Consumer protection for MFS and payments generally through current statute, contract, and payment law and common law condictiones are found to be wanting. Possible regulatory arbitrage in relation to MFS in South African law is discussed. The legal and regulatory regimes in the European Union, Kenya and the United States of America are compared with South Africa. The need for a coordinated payments-specific law that has consumer protections, enables proportional risk-based licensing of new non-bank providers of MFS, and allows for a regulator for retail payments is recommended. The use of trust companies and trust accounts is recommended for protection of user funds. | viPublic, Constitutional and International LawLL. D

    Patent Law: Cases & Materials ~ Version 2.0

    Full text link
    The book contains edited cases, patent figures, and excerpts, along with brief introductions on patent law. This book is designed for use in close conjunction with a specific softcover hornbook published by Wolters Kluwer, Janice Mueller’s, Patent Law, Fourth Edition (Aspen Student Treatise Series 2013). If you decide to use this case collection to teach a course of your own — as I hope people will — please check back to ensure that you have the most up-to-date version. This version, which is 2.0, was posted in June 2015. Reproduced and linked with permission of the author.https://digitalcommons.law.uga.edu/books/1101/thumbnail.jp

    Human Factors Design Standard for Acquisition of Commercial-off-the-Shelf Subsystems, Non-Developmental Items, and Developmental Systems

    Get PDF
    The Human Factors Design Standard (HFDS) provides reference information to assist in the selection, analysis, design, development, and evaluation of new and modified Federal Aviation Administration (FAA) systems and equipment. This document is based largely on the 1996 Human Factors Design Guide (HFDG) produced by the FAA in 1996. It converts the original guidelines document to a standard and incorporates updated information, including the newly revised chapters on automation and human-computer interface. The updated document includes extensive reorganization of material based on user feedback on how the document has been used in the past. Additional information has been also been added to help the users better understand tradeoffs involved with specific design criteria. This standard covers a broad range of human factors topics that pertain to automation, maintenance, displays and printers, controls and visual indicators, alarms, alerts and voice output, input devices, workplace design, system security, safety, the environment, and anthropometry documentation. This document also includes extensive human-computer interface information
    corecore