8 research outputs found

    A novel image authenticationand rightful ownership detection framework based on DWT watermarking in cloud environment

    Get PDF
    Cloud computing has been highlighted by many organizations because of its benefits to use it anywhere. Efficiency, Easy access information, quick deployment, and a huge reduce of cost of using it, are some of the cloud advantages. While cost reduction is one of the great benefits of cloud, privacy protection of the usersā€˜ data is also a significant issue of the cloud that cloud providers have to consider about. This is a vital component of the cloudā€˜s critical infrastructure. Cloud users use this environment to enable numerous online transactions crossways a widespread range of sectors and to exchange information. Especially, misuse of the usersā€˜ data and private information are some of the important problems of using cloud environment. Cloud untrustworthy environment is a good area for hackers to steal userā€˜s stored data by Phishing and Pharming techniques. Therefore, cloud vendors should utilize easy- to-use, secure, and efficient environment. Besides they should prepare a way to access cloud services that promote data privacy and ownership protection. The more data privacy and ownership protection in cloud environment, the more users will attract to use this environment to put their important private data. In this study, a rightful ownership detection framework has been proposed to mitigate the ownership protection in cloud environment. Best methods for data privacy protection such as image authentication methods, watermarking methods and cryptographic methods, for mitigating the ownership protection problem to use in cloud environment, have been explored. Finally, efficiency and reliability of the proposed framework have been evaluated and analyzed

    Evaluating small drone surveillance capabilities to enhance traffic conformance intelligence

    Get PDF
    The availability of cheap small physical drones that fly around and have a variety of visual and sensor networks attached invites investigation for work applications. In this research we assess the capability of a set of commercially available drones (VTOL) that cost less than 1000(Cheapisarelativetermandweconsideranythinglessthan1000 (Cheap is a relative term and we consider anything less than 5000 relatively cheap). The assessment reviews the capability to provide secure and safe motor vehicle surveillance for conformance intelligence. The evaluation was conducted by initially estimating a set of requirements that would satisfy an ideal surveillance situation and then by comparing a sample of drone specifications. The search is for identifying a drone that is fit for purpose. The conclusion is that more than 1000needstobespentonthedroneandtheresourcesforeffectiveobservationbutlessthan1000 needs to be spent on the drone and the resources for effective observation but less than 3000 in total is sufficient for the work application. The result and the analysis of traditional surveillance networks suggests that such drones can provide a low entry risk for additional benefits; and intelligence to those responsible for compliance on our roads

    Using Design Science to Build a Watermark System for Cloud Rightful Ownership Protection

    Get PDF
    Cloud computing opportunities have presented service options for users that are both economical and flexible to use requirements. However, the risk analysis for the user identifies vulnerabilities for intellectual property ownership and vulnerabilities for the identification of rightful property owners when cloud services are used. It is common for image owners to embed watermarks and other security mechanisms into their property so that the rightful ownership may be identified. In this paper we present a design that overcomes many of the current limitations in cloud watermarking uses; and propose a schema that places responsibility on the cloud provider to have a robust information protection program. Such a design solution lays out an information security architecture that enhances utility for cloud services and gives better options for users to securely place properties in the cloud. The Design Science methodology is used to build the artefact and answer the research question: How can rightful ownership be protected in the Cloud

    A privacy gap around the internet of things for open-source projects

    Get PDF
    The Internet of Things (IoT) is having a more important role in the everyday lives of people. The distribution of connectivity across social and personal interaction discloses personalised information and gives access to a sphere of sensitivities that were previously masked. Privacy measures and security to protect personal sensitivities are weak and in their infancy. In this paper we review the issue of privacy in the context of IoT open-source projects, and the IoT security concerns. A proposal is made to create a privacy bubble around the interoperability of devices and systems and a filter layer to mitigate the exploitation of personal and private information by marketing companies

    Detecting Slow DDos Attacks on Mobile Devices

    Get PDF
    Denial of service attacks, distributed denial of service attacks and reflector attacks are well known and documented events. More recently these attacks have been directed at game stations and mobile communication devices as strategies for disrupting communication. In this paper we ask, How can slow DDos attacks be detected? The similarity metric is adopted and applied for potential application. A short review of previous literature on attacks and prevention methodologies is provided and strategies are discussed. An innovative attack detection method is introduced and the processes and procedures are summarized into an investigation process model. The advantages and benefits of applying the metric are demonstrated and the importance of trace back preparation discussed

    Neurosecurity for brainware devices

    Get PDF
    Brainware has a long history of development down into the present day where very simple and usable devices are available to train for the control of games and services. One of the big areas of application has been in the health sciences to provide compensatory control to humans who may lack the usual capabilities. Our concern has been the protection of information in brainware so that a human intention may have confidentiality, integrity, and accessibility to the required implementation mechanisms for services. The research question was: What are the consequences of security failure in brainware? Our research tested a brainware device and found vulnerabilities. The most significant vulnerability was the ability to capture and inject communication packets so that a human intention could be hijacked. The consequences of this communication failure are for psychological harm to the human and unplanned for actions in the material environment

    Image Authentication and Rightful Ownership Watermarking Method for the Cloud Environment

    No full text
    Cloud computing has evolved in the last five years from being an abstract idea and proposal, and into services that people use every day. In particular services that relate to mobile phone technologies have expanded in proportion to the number of users, so that for example the use of cloud drop boxes for photos, videos, and audio recordings is done on a daily basis. In the bigger picture businesses have found it economical to exploit the new opportunities and to migrate much of their previous business computing capability and storage facilities into the cloud. With opportunity there always comes the positive and negative aspects of risk. With cloud computing the economic advantages and the ease of access have outweighed the risk of unplanned information disclosure. Cloud computing spans a multitude of technologies, is multi-layered, and crosses the boundaries of different legal jurisdictions. As a consequence it is possible for an end user to commit their information and/or the information processing into cloud services with a trusted supplier. However, the cloud service supplier interacts with many other service suppliers who may not share the same legal compliance or understanding of the service level agreements. The complication of service agreements also extends to the ability of anyone service level agreement to adequately protect digital property rights. In this thesis the problem of rightful ownership is raised and research questions developed to explore the potential positive and negative risks around property ownership in the cloud. The three research questions are asked: ā€¢ What preparation methods improve ownership protection in cloud environments? ā€¢ What could be a suitable management framework to increase ownership protection in a cloud environment? ā€¢ What tests show the reliability of a proposed method in a cloud environment? The literature analysis identified both watermarking and watermarking technologies as being relevant to the key issue of privacy protection. Consequently the researcher chose to build a watermarking application and to introduce unique security features and implementation schema as a working solution to the problem. A design science approach is adopted as being relevant to an exploratory investigation and the development of software artefacts that are open to revision and continuous improvement. The researcher builds a watermarking software artefact (see Appendix B for the code, and chapter 4 for the demonstration) and submits to industry experts for naturalistic feedback. Comprehensive statistical analysis is also performed on the artefact to know and to understand the value of the implementation. It was found that this particular solution to the rightful ownership problem is a working solution that can be further developed in theory and in practice. The significant innovation proposed in this thesis is that the service supplier takes responsibility for watermarking all objects submitted to the cloud in the interests of standardisation, performance, and security of information in the cloud. The nature and approach of this research has been to address the theoretical problem by reasoning and then to deliver a solution by demonstrating a relevant software artefact. The software artefact for watermarking has performed well and passed naturalistic scrutiny but it requires further development and maturity before it can be generalised across the Cloud services industry. The suggestions for further research arising from this thesis are: ā€¢ examination of watermarking potential for all information submitted to the cloud ā€¢ further research and intellectual property protection in the Cloud ā€¢ further exploration of industry sector specific requirements for watermarking ā€¢ the development of policies and law that applies to ownership issues in the cloud ā€¢ standardisation procedures for all cloud service suppliers ā€¢ the availability of watermarking tools on every cloud service suppliers sit

    Secure openID authentication model by using trusted computing

    Get PDF
    The growth of Internet online services has been very quick in recent years. Each online service requires Internet users to create a new account to use the service. The problem can be seen when each user usually needs more than one service and, consequently, has numerous accounts. These numerous accounts have to be managed in a secure and simple way to be protected against identity theft. Single sign-on (SSO) and OpenID have been used to decrease the complexity of managing numerous accounts required in the Internet identity environment. Trusted Platform Module (TPM) and Trust Multitenancy are great trusted computing-based technologies to solve security concerns in the Internet identity environment. Since trust is one of the pillars of security in the cloud, this paper analyzes the existing cloud identity techniques in order to investigate their strengths and weaknesses. This paper proposes a model in which One Time Password (OTP), TPM, and OpenID are used to provide a solution against phishing as a common identity theft in cloud environment
    corecore