1,017 research outputs found
SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol
A plethora of contact tracing apps have been developed and deployed in
several countries around the world in the battle against Covid-19. However,
people are rightfully concerned about the security and privacy risks of such
applications. To this end, the contribution of this work is twofold. First, we
present an in-depth analysis of the security and privacy characteristics of the
most prominent contact tracing protocols, under both passive and active
adversaries. The results of our study indicate that all protocols are
vulnerable to a variety of attacks, mainly due to the deterministic nature of
the underlying cryptographic protocols. Our second contribution is the design
and implementation of SpreadMeNot, a novel contact tracing protocol that can
defend against most passive and active attacks, thus providing strong
(provable) security and privacy guarantees that are necessary for such a
sensitive application. Our detailed analysis, both formal and experimental,
shows that SpreadMeNot satisfies security, privacy, and performance
requirements, hence being an ideal candidate for building a contact tracing
solution that can be adopted by the majority of the general public, as well as
to serve as an open-source reference for further developments in the field
"On the Road" - Reflections on the Security of Vehicular Communication Systems
Vehicular communication (VC) systems have recently drawn the attention of
industry, authorities, and academia. A consensus on the need to secure VC
systems and protect the privacy of their users led to concerted efforts to
design security architectures. Interestingly, the results different project
contributed thus far bear extensive similarities in terms of objectives and
mechanisms. As a result, this appears to be an auspicious time for setting the
corner-stone of trustworthy VC systems. Nonetheless, there is a considerable
distance to cover till their deployment. This paper ponders on the road ahead.
First, it presents a distillation of the state of the art, covering the
perceived threat model, security requirements, and basic secure VC system
components. Then, it dissects predominant assumptions and design choices and
considers alternatives. Under the prism of what is necessary to render secure
VC systems practical, and given possible non-technical influences, the paper
attempts to chart the landscape towards the deployment of secure VC systems
Attribute Based Secured and Efficient Cloud Storage Middleware for Mobile Cloud Computing using PDP
Today handheld devices are playing more vital roles in the people�s daily lives with the fast development of wireless technology. All these devices use Internet for fetching & accessing services. Many current applications are being deployed on Cloud to save hardware & software cost. Mobile cloud has become remarkable cloud service model; in which, mobile devices are used as the information collecting and processing nodes for the cloud infrastructure. Cloud has become the pervasive digital platform for many network applications in their quest to provide a single unified digital platform. In this paper, we present insignificant Cloud-based storage framework. This framework will provide an easy-to-use file navigation service for attribute-based fill querying. Simultaneously, it incorporates an effective structure for users to verify their data integrity, which can relieve much load from mobile devices. Experimental simulations show that the proposed framework is effective to provide flexible data sharing in mobile computing environments
- …