7 research outputs found

    Database Tampering Monitoring System to Enhance Security

    Get PDF
    Nowadays, usage of internet has increased for various purposes like online shopping, online transaction, internet banking, etc. Almost everything is done online. With this increased usage of internet, websites are prone to attacks. Security system is nothing but an intrusion detection system (IDS) that models the network behavior of user sessions. It protects both the front-end web server as well as back-end database. It monitors both web and subsequent database requests. So, it is possible to identify attacks that independent IDS would not be able to identify. Our contribution is to find leaked data which is done by hacker. Next steps to detect the different attacks for preventing unauthorized access users

    Two Efficient outsourced ABS (OABS) Schemes Denoted By OABS-I And OABS-II To Build An Efficient outsourced Verifying Protocol

    Get PDF
    Attribute-based signature (ABS) facilitates revelry to mark a message with fine-grained access control over make out information. Particularly, in an ABS system, users get hold of their attribute private keys from an attribute authority, with which they can presently sign messages for any predicate fulfilled by their attributes. We first advise and formalize a new concept called Outsourced ABS, i.e., OABS, in which the computational overhead at user side is really concentrated through outsourcing concentrated computations to an untrusted signing-cloud service provider (S-CSP). In addition, we be relevant this novel paradigm to existing ABS schemes to decrease the difficulty

    How to build a faster private information retrieval protocol?

    Get PDF

    V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service

    Get PDF
    corecore