1,576 research outputs found
Prevention of information harvesting in a cloud services environment
We consider a cloud data storage involving three entities, the cloud customer, the cloud business centre which provides services, and the cloud data storage centre. Data stored in the data storage centre comes from a variety of customers and some of these customers may compete with each other in the market place or may own data which comprises confidential information about their own clients. Cloud staff have access to data in the data storage centre which could be used to steal identities or to compromise cloud customers. In this paper, we provide an efficient method of data storage which prevents staff from accessing data which can be abused as described above. We also suggest a method of securing access to data which requires more than one staff member to access it at any given time. This ensures that, in case of a dispute, a staff member always has a witness to the fact that she accessed data
Function length as a tool for malware classification
The proliferation of malware is a serious threat to computer and information systems throughout the world. Antimalware companies are continually challenged to identify and counter new malware as it is released into the wild. In attempts to speed up this identification and response, many researchers have examined ways to efficiently automate classification of malware as it appears in the environment. In this paper, we present a fast, simple and scalable method of classifying Trojans based only on the lengths of their functions. Our results indicate that function length may play a significant role in classifying malware, and, combined with other features, may result in a fast, inexpensive and scalable method of malware classification.<br /
Fast recovery from node compromise in wireless sensor networks
Wireless Sensor Networks (WSNs) are susceptible to a wide range of security attacks in hostile environments due to the limited processing and energy capabilities of sensor nodes. Consequently, the use of WSNs in mission critical applications requires reliable detection and fast recovery from these attacks. While much research has been devoted to detecting security attacks, very little attention has been paid yet to the recovery task. In this paper, we present a novel mechanism that is based on dynamic network reclustering and node reprogramming for recovering from node compromise. In response to node compromise, the proposed recovery approach reclusters the network excluding compromised nodes; thus allowing normal network operation while initiating node recovery procedures. We propose a novel reclustering algorithm that uses 2-hop neighbourhood information for this purpose. For node reprogramming we propose the modified Deluge protocol. The proposed node recovery mechanism is both decentralized and scalable. Moreover, we demonstrate through its implementation on a TelosB-based sensor network testbed that the proposed recovery method performs well in a low-resource WSN.<br /
Unusual magnetic-field dependence of partially frustrated triangular ordering in manganese tricyanomethanide
Manganese tricyanomethanide, Mn[C(CN)3]2, consists of two interpenetrating
three-dimensional rutile-like networks. In each network, the tridentate C(CN)3-
anion gives rise to superexchange interactions between the Mn2+ ions (S=5/2)
that can be mapped onto the "row model" for partially frustrated triangular
magnets. We present heat capacity measurements that reveal a phase transition
at T_N = 1.18K, indicative of magnetic ordering. The zero-field magnetically
ordered structure was solved from neutron powder diffraction data taken between
0.04 and 1.2 K. It consists of an incommensurate spiral with a temperature
independent propagation vector Q=(2Q 0 0)=(+/-0.622 0 0), where different signs
relate to the two different networks. This corresponds to (+/-0.311 +/-0.311 0)
in a quasi-hexagonal representation. The ordered moment mu=3.3mu_B is about 2/3
of the full Mn2+ moment. From the values of T_N and Q, the exchange parameters
J/k = 0.15 K and J'/J = 0.749 are estimated. The magnetic-field dependence of
the intensity of the Bragg reflection, measured for external fields
H||Q, indicates the presence of three different magnetic phases. We associate
them with the incommensurate spiral (H < 13.5 kOe), an intermediate phase (13.5
kOe 16 kOe)
proposed for related compounds. For increasing fields, Q continuously
approaches the value 1/3, corresponding to the commensurate magnetic structure
of the fully frustrated triangular lattice. This value is reached at H_c = 19
kOe. At this point, the field-dependence reverses and Q adopts a value of 0.327
at 26 kOe, the highest field applied in the experiment. Except for H_c, the
magnetic ordering is incommensurate in all three magnetic phases of
Mn[C(CN)3]2.Comment: accepted for publication in J. Phys.: Condens. Matte
Recommended from our members
Fabrication of an Active Electronic Device Using a Hetero-bimetallic Coordination Polymer
A nickel(II)/lead(II) coordination polymer [(NCS)Pb(H2O)LNi(NCS)]n {H2L=N,N′-bis(3-methoxysalicylidene)propane-1,3-diamine} has been synthesized and characterized. The band gap (3.18 eV) calculated from Tauc’s plot suggests the semiconducting nature of the complex. The material has a photosensitivity of 5.76, indicating its applicability in the fabrication of photosensitive devices. The complex has been successfully applied in a technologically challenging thin-film photosensitive Schottky device
- …