12 research outputs found

    Hide-and-seek: face recognition in private

    Get PDF
    Recent trend towards cloud computing and outsourcing has led to the requirement for face recognition (FR) to be performed remotely by third-party servers. When outsourcing the FR, client's test image and classification result will be revealed to the servers. Within this context, we propose a novel privacy-preserving (PP) FR algorithm based on randomization. Existing PP FR algorithms are based on homomorphic encryption (HE) which requires higher computational power and communication bandwidth. Since we use randomization, the proposed algorithm outperforms the HE based algorithm in terms of computational and communication complexity. We validated our algorithm using popular ORL database. Experimental results demonstrate that accuracy of the proposed algorithm is the same as the accuracy of existing algorithms, while improving the computational efficiency by 120 times and communication complexity by 2.5 times against the existing HE based approach

    Smart, secure and seamless access control scheme for mobile devices

    Get PDF
    Smart devices capture users' activity such as unlock failures, application usage, location and proximity of devices in and around their surrounding environment. This activity information varies between users and can be used as digital fingerprints of the users' behaviour. Traditionally, users are authenticated to access restricted data using long term static attributes such as password and roles. In this paper, in order to allow secure and seamless data access in mobile environment, we combine both the user behaviour captured by the smart device and the static attributes to develop a novel access control technique. Security and performance analyses show that the proposed scheme substantially reduces the computational complexity while enhances the security compared to the conventional schemes

    MMSE-based beamforming techniques for relay broadcast channels

    Get PDF
    We propose minimum mean square error (MMSE)-based beamforming techniques for a multiantenna relay network, where a base station (BS) equipped with multiple antennas communicates with a number of single-antenna users through a multiantenna relay. We specifically solve three optimization problems, namely, 1) the sum-power minimization problem, 2) the mean-square-error (MSE) balancing problem, and 3) the mixed quality-of-service (QoS) problem. Unfortunately, these problems are not jointly convex in terms of beamforming vectors at the BS and the relay amplification matrix. To circumvent this nonconvexity issue, the original problems are divided into two subproblems, where the beamforming vectors and the relay amplification matrix are alternately optimized, whereas the other is fixed. Three iterative algorithms are developed based on convex optimization techniques and general MSE duality. Simulation results are provided to validate the convergence of the proposed algorithms

    Robust access control framework for mobile cloud computing network

    Get PDF
    Unified communications has enabled seamless data sharing between multiple devices running on various platforms. Traditionally, organizations use local servers to store data and employees access the data using desktops with predefined security policies. In the era of unified communications, employees exploit the advantages of smart devices and 4G wireless technology to access the data from anywhere and anytime. Security protocols such as access control designed for traditional setup are not sufficient when integrating mobile devices with organization's internal network. Within this context, we exploit the features of smart devices to enhance the security of the traditional access control technique. Dynamic attributes in smart devices such as unlock failures, application usage, location and proximity of devices can be used to determine the risk level of an end-user. In this paper, we seamlessly incorporate the dynamic attributes to the conventional access control scheme. Inclusion of dynamic attributes provides an additional layer of security to the conventional access control. We demonstrate that the efficiency of the proposed algorithm is comparable to the efficiency of the conventional schemes

    SmartARM: A smartphone-based group activity recognition and monitoring scheme for military applications

    Get PDF
    © 2017 IEEE. In this paper we propose SmartARM-A Smartphone-based group Activity Recognition and Monitoring (ARM) scheme, which is capable of recognizing and centrally monitoring coordinated group and individual group member activities of soldiers in the context of military excercises. In this implementation, we specifically consider military operations, where the group members perform similar motions or manoeuvres on a mission. Additionally, remote administrators at the command center receive data from the smartphones on a central server, enabling them to visualize and monitor the overall status of soldiers in situations such as battlefields, urban operations and during soldier's physical training. This work establishes-(a) the optimum position of smartphone placement on a soldier, (b) the optimum classifier to use from a given set of options, and (c) the minimum sensors or sensor combinations to use for reliable detection of physical activities, while reducing the data-load on the network. The activity recognition modules using the selected classifiers are trained on available data-sets using a test-train-validation split approach. The trained models are used for recognizing activities from live smartphone data. The proposed activity detection method puts forth an accuracy of 80% for real-time data

    PIndroid: A novel Android malware detection system using ensemble learning

    Get PDF
    The extensive usage of smartphones has been the major driving force behind a drastic increase of new security threats. The stealthy techniques used by malware make them hard to detect with signature based intrusion detection and anti-malware methods. In this paper, we present PIndroid|a novel Permissions and Intents based framework for identifying Android malware apps. To the best of our knowledge, PIndroid is the first solution that uses a combination of permissions and intents supplemented with multiple stages of classifiers for malware detection. Ensemble techniques are applied for optimization of detection results. We apply the proposed approach on 1,745 real world applications and obtain 99.8% accuracy which is the best reported to date. Empirical results suggest that our proposed framework built on permissions and intents is effective in detecting malware applications

    Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption

    Get PDF
    © 2017 IEEE. The Internet of Things (IoT) has penetrated deeply into our lives and the number of IoT devices per person is expected to increase substantially over the next few years. Due to the characteristics of IoT devices (i.e., low power and low battery), usage of these devices in critical applications requires sophisticated security measures. Researchers from academia and industry now increasingly exploit the concept of blockchains to achieve security in IoT applications. The basic idea of the blockchain is that the data generated by users or devices in the past are verified for correctness and cannot be tampered once it is updated on the blockchain. Even though the blockchain supports integrity and non-repudiation to some extent, confidentiality and privacy of the data or the devices are not preserved. The content of the data can be seen by anyone in the network for verification and mining purposes. In order to address these privacy issues, we propose a new privacy-preserving blockchain architecture for IoT applications based on attribute-based encryption (ABE) techniques. Security, privacy, and numerical analyses are presented to validate the proposed model

    Privacy-preserving multi-class support vector machine for outsourcing the data classification in cloud

    Get PDF
    Emerging cloud computing infrastructure replaces traditional outsourcing techniques and provides flexible services to clients at different locations via Internet. This leads to the requirement for data classification to be performed by potentially untrusted servers in the cloud. Within this context, classifier built by the server can be utilized by clients in order to classify their own data samples over the cloud. In this paper, we study a privacy-preserving (PP) data classification technique where the server is unable to learn any knowledge about clients' input data samples while the server side classifier is also kept secret from the clients during the classification process. More specifically, to the best of our knowledge, we propose the first known client-server data classification protocol using support vector machine. The proposed protocol performs PP classification for both two-class and multi-class problems. The protocol exploits properties of Pailler homomorphic encryption and secure two-party computation. At the core of our protocol lies an efficient, novel protocol for securely obtaining the sign of Pailler encrypted numbers

    Assessing data breach risk in cloud systems

    Get PDF
    The emerging cloud market introduces a multitude of cloud service providers, making it difficult for consumers to select providers who are likely to be a low risk from a security perspective. Recently, significant emphasis has arisen on the need to specify Service Level Agreements that address security concerns of consumers (referred to as SecSLAs) - these are intended to clarify security support in addition to Quality of Service characteristics associated with services. It has been found that such SecSLAs are not consistent among providers, even though they offer services with similar functionality. However, measuring security service levels and the associated risk plays an important role when choosing a cloud provider. Data breaches have been identified as a high priority threat influencing the adoption of cloud computing. This paper proposes a general analysis framework which can compute risk associated with data breaches based on pre-agreed SecSLAs for different cloud providers. The framework exploits a tree based structure to identify possible attack scenarios that can lead to data breaches in the cloud and a means of assessing the use of potential mitigation strategies to reduce such breaches

    Effective recognition of facial micro-expressions with video motion magnification

    Get PDF
    Facial expression recognition has been intensively studied for decades, notably by the psychology community and more recently the pattern recognition community. What is more challenging, and the subject of more recent research, is the problem of recognizing subtle emotions exhibited by so-called micro-expressions. Recognizing a micro-expression is substantially more challenging than conventional expression recognition because these micro-expressions are only temporally exhibited in a fraction of a second and involve minute spatial changes. Until now, work in this field is at a nascent stage, with only a few existing micro-expression databases and methods. In this article, we propose a new micro-expression recognition approach based on the Eulerian motion magnification technique, which could reveal the hidden information and accentuate the subtle changes in micro-expression motion. Validation of our proposal was done on the recently proposed CASME II dataset in comparison with baseline and state-of-the-art methods. We achieve a good recognition accuracy of up to 75.30% by using leave-one-out cross validation evaluation protocol. Extensive experiments on various factors at play further demonstrate the effectiveness of our proposed approach
    corecore