857 research outputs found

    Towards Provenance Cloud Security Auditing Based on Association Rule Mining

    Get PDF
    Cloud storage provides external data storage services by combining and coordinating different types of devices in a network to work collectively. However, there is always a trust relationship between users and service providers, therefore, an effective security auditing of cloud data and operational processes is necessary. We propose a trusted cloud framework based on a Cloud Accountability Life Cycle (CALC). We suggest that auditing provenance data in cloud servers is a practical and efficient method to log data, being relatively stable and easy to collect type of provenance data. Furthermore, we suggest a scheme based on user behaviour (UB) by analysing the log data from cloud servers. We present a description of rules for a UB operating system log, and put forward an association rule mining algorithm based on the Long Sequence Frequent Pattern (LSFP) to extract the UB. Finally, the results of our experiment prove that our solution can be implemented to track and forensically inspect the data leakage in an efficient manner for cloud security auditing

    Polynomial based key predistribution scheme in wireless mesh networks

    Full text link
    Wireless mesh networks (WMNs) have the ability to integrate with other networks while providing a fast and cost-saving deployment. The network security is one of important challenge problems in this kind of networks. This paper is focused on key management between mesh and sensor networks. We propose an efficient key pre-distribution scheme based on two polynomials in wireless mesh networks by employing the nature of heterogeneity. Our scheme realizes the property of bloom filters, i.e., neighbor nodes can discover their shared keys but have no knowledge on the different keys possessed by the other node, without the probability of false positive. The analysis presented in this paper shows that our scheme has the ability to establish three different security level keys and achieves the property of self adaptive security for sensor networks with acceptable computation and communication consumption

    A concrete certificateless signature scheme without pairings

    Get PDF
    Certificateless public key cryptography was introduced to avoid the inherent key escrow problem in identity-based cryptography, and eliminate the use of certificates in traditional PKI. Most cryptographic schemes in certificateless cryptography are built from bilinear mappings on elliptic curves which need costly operations. Despite the investigation of certificateless public key encryption without pairings, certificateless signature without pairings received much less attention than what it deserves. In this paper, we present a concrete pairing-free certificateless signature scheme for the first time. Our scheme is more computationally efficient than others built from pairings. The new scheme is provably secure in the random oracle model assuming the hardness of discrete logarithm problem

    Consumer intention to use service robots: A cognitive–affective–conative framework

    Get PDF
    Purpose: Drawing on the cognitive–affective–conative framework, this study aims to develop a model of service robot acceptance in the hospitality sector by incorporating both cognitive evaluations and affective responses. Design/methodology/approach: A mixed-method approach combining qualitative and quantitative methods was used to develop measurement and test research hypotheses. Findings: The results show that five cognitive evaluations (i.e. cuteness, coolness, courtesy, utility and autonomy) significantly influence consumers’ positive affect, leading to customer acceptance intention. Four cognitive evaluations (cuteness, interactivity, courtesy and utility) significantly influence consumers’ negative affect, which in turn positively affects consumer acceptance intention. Practical implications: This study provides significant implications for the design and implementation of service robots in the hospitality and tourism sector. Originality/value: Different from traditional technology acceptance models, this study proposed a model based on the hierarchical relationships of cognition, affect and conation to enhance knowledge about human–robot interactions

    Cryptanalysis and improvement of an efficient certificateless signature scheme

    Full text link
    In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless signature scheme was introduced. The advantage of certificate-less public key cryptography successfully eliminates the necessity of certificates in the traditional public key cryptography and simultaneously solves the inherent key escrow problem suffered in identity-based cryptography. Recently, Yap et al. proposed an efficient certificateless signature scheme and claimed that their scheme is existentially unforgeable in the random oracle model. In this paper, we show that the certificateless signature scheme proposed by Yap et al. is insecure against public key replacement attacks. Furthermore, we propose an improved certificateless signature scheme, which is existentially unforgeable against adaptive chosen message attacks under the computational Diffie-Hellman assumption in the random oracle model and provide the security proof of the proposed scheme
    • 

    corecore