1,017 research outputs found

    SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol

    Full text link
    A plethora of contact tracing apps have been developed and deployed in several countries around the world in the battle against Covid-19. However, people are rightfully concerned about the security and privacy risks of such applications. To this end, the contribution of this work is twofold. First, we present an in-depth analysis of the security and privacy characteristics of the most prominent contact tracing protocols, under both passive and active adversaries. The results of our study indicate that all protocols are vulnerable to a variety of attacks, mainly due to the deterministic nature of the underlying cryptographic protocols. Our second contribution is the design and implementation of SpreadMeNot, a novel contact tracing protocol that can defend against most passive and active attacks, thus providing strong (provable) security and privacy guarantees that are necessary for such a sensitive application. Our detailed analysis, both formal and experimental, shows that SpreadMeNot satisfies security, privacy, and performance requirements, hence being an ideal candidate for building a contact tracing solution that can be adopted by the majority of the general public, as well as to serve as an open-source reference for further developments in the field

    "On the Road" - Reflections on the Security of Vehicular Communication Systems

    Get PDF
    Vehicular communication (VC) systems have recently drawn the attention of industry, authorities, and academia. A consensus on the need to secure VC systems and protect the privacy of their users led to concerted efforts to design security architectures. Interestingly, the results different project contributed thus far bear extensive similarities in terms of objectives and mechanisms. As a result, this appears to be an auspicious time for setting the corner-stone of trustworthy VC systems. Nonetheless, there is a considerable distance to cover till their deployment. This paper ponders on the road ahead. First, it presents a distillation of the state of the art, covering the perceived threat model, security requirements, and basic secure VC system components. Then, it dissects predominant assumptions and design choices and considers alternatives. Under the prism of what is necessary to render secure VC systems practical, and given possible non-technical influences, the paper attempts to chart the landscape towards the deployment of secure VC systems

    Attribute Based Secured and Efficient Cloud Storage Middleware for Mobile Cloud Computing using PDP

    Get PDF
    Today handheld devices are playing more vital roles in the people�s daily lives with the fast development of wireless technology. All these devices use Internet for fetching & accessing services. Many current applications are being deployed on Cloud to save hardware & software cost. Mobile cloud has become remarkable cloud service model; in which, mobile devices are used as the information collecting and processing nodes for the cloud infrastructure. Cloud has become the pervasive digital platform for many network applications in their quest to provide a single unified digital platform. In this paper, we present insignificant Cloud-based storage framework. This framework will provide an easy-to-use file navigation service for attribute-based fill querying. Simultaneously, it incorporates an effective structure for users to verify their data integrity, which can relieve much load from mobile devices. Experimental simulations show that the proposed framework is effective to provide flexible data sharing in mobile computing environments
    • …
    corecore