6 research outputs found

    Security Aspects in Web of Data Based on Trust Principles. A brief of Literature Review

    Get PDF
    Within scientific community, there is a certain consensus to define "Big Data" as a global set, through a complex integration that embraces several dimensions from using of research data, Open Data, Linked Data, Social Network Data, etc. These data are scattered in different sources, which suppose a mix that respond to diverse philosophies, great diversity of structures, different denominations, etc. Its management faces great technological and methodological challenges: The discovery and selection of data, its extraction and final processing, preservation, visualization, access possibility, greater or lesser structuring, between other aspects, which allow showing a huge domain of study at the level of analysis and implementation in different knowledge domains. However, given the data availability and its possible opening: What problems do the data opening face? This paper shows a literature review about these security aspects

    Security Aspects in Web of Data Based on Trust Principles. A brief of Literature Review

    Get PDF
    Within scientific community, there is a certain consensus to define "Big Data" as a global set, through a complex integration that embraces several dimensions from using of research data, Open Data, Linked Data, Social Network Data, etc. These data are scattered in different sources, which suppose a mix that respond to diverse philosophies, great diversity of structures, different denominations, etc. Its management faces great technological and methodological challenges: The discovery and selection of data, its extraction and final processing, preservation, visualization, access possibility, greater or lesser structuring, between other aspects, that allow showing a huge domain of study at the level of analysis and implementation in different knowledge domains. However, given the data availability and its possible opening: What problems do the data opening face? This paper shows a literature review about these security aspects

    Challenges and Opportunities in Applying Semantics to Improve Access Control in the Field of Internet of Things

    Get PDF
    The increased number of IoT devices results in continuously generated massive amounts of raw data. Parts of this data are private and highly sensitive as they reflect owner’s behavior, obligations, habits, and preferences. In this paper, we point out that flexible and comprehensive access control policies are “a must” in the IoT domain. The Semantic Web technologies can address many of the challenges that the IoT access control is facing with today. Therefore, we analyze the current state of the art in this area and identify the challenges and opportunities for improved access control in a semantically enriched IoT environment. Applying semantics to IoT access control opens a lot of opportunities, such as semantic inference and reasoning, easy data sharing, data trading, new approaches to authentication, security policies based on a natural language and enhances the interoperability using a common ontology

    Um método de defesa contra ataques DoS baseado em assinaturas digitais

    Get PDF
    Tese (doutorado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2018.Uma nova técnica de identificação de uma fonte de transmissão em uma rede baseada em interconexão de pacotes é apresentada neste trabalho. O modelo apresentado proporciona garantias de que uma fonte de tráfego é legítima, no sentido a permitir que o destino possa se certificar de que o fluxo na rede não tem a declaração de origem forjada. Este tipo de mecanismo tem aplicação fundamental na construção de esquemas de defesa e detecção contra ataques de negação de serviço DoS (Denial of Serviçe). O esquema proposto é baseado em assinaturas digitais designáveis, e argumenta-se que a proposta é sem precedentes na maneira que aquelas ferramentas criptográficas são aplicadas para construção de uma defesa contra ataques DoS. O esquema proposto não se baseia em um ferramental criptográfico de alta complexidade computacional, e se mostra apropriado para implementação de defesas de uma ampla gama de dispositivos, inclusive os de pequena capacidade. Uma análise da proposição é apresentada com uma argumentação da segurança do esquema, que é confrontada com conhecidas estratégias de ataque. Ainda mais, uma comparação da proposta às existentes na literatura é também defendida, destacando-se vantagens e desvantagem em relação ao que se encontra no atual estado da arte.This work presents a novel technique for source identification of a packet stream in a network, which intends to give guarantees that a specific network flow really comes from a claimed origin. This mechanism can be an essential tool for addressing Denial of Service (DoS) attacks. Based on designated verifier signature schemes, our proposal is an appropriate and unprecedented solution applying digital signatures for DoS prevention. Our scheme does not rely on an expensive public-key infrastructure and makes use of lightweight cryptography machinery that is suitable in the context of the small devices. We analyze our proposed scheme as a defense measure considering known DoS attacks and we discuss its resilience face to eventual adversaries. Furthermore, we compare our solution to already existent strategies, highlighting its advantages and drawbacks

    Linked Data Authorization Platform

    No full text
    corecore