• Title/Summary/Keyword: Protocol-Based Approach

Search Result 435, Processing Time 0.024 seconds

Identity-based Deniable Authenticated Encryption for E-voting Systems

  • Jin, Chunhua;Chen, Guanhua;Zhao, Jianyang;Gao, Shangbing;Yu, Changhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3299-3315
    • /
    • 2019
  • Deniable authentication (DA) is a protocol in which a receiver can generate an authenticator that is probabilistically indistinguishable from a sender. DA can be applied in many scenarios that require user privacy protection. To enhance the security of DA, in this paper, we construct a new deniable authenticated encryption (DAE) scheme that realizes deniable authentication and confidentiality in a logical single step. Compared with existing approaches, our approach provides proof of security and is efficient in terms of performance analysis. Our scheme is in an identity-based environment; thus, it avoids the public key certificate-based public key infrastructure (PKI). Moreover, we provide an example that shows that our protocol is applicable for e-voting systems.

Privacy-Preserving Cloud Data Security: Integrating the Novel Opacus Encryption and Blockchain Key Management

  • S. Poorani;R. Anitha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3182-3203
    • /
    • 2023
  • With the growing adoption of cloud-based technologies, maintaining the privacy and security of cloud data has become a pressing issue. Privacy-preserving encryption schemes are a promising approach for achieving cloud data security, but they require careful design and implementation to be effective. The integrated approach to cloud data security that we suggest in this work uses CogniGate: the orchestrated permissions protocol, index trees, blockchain key management, and unique Opacus encryption. Opacus encryption is a novel homomorphic encryption scheme that enables computation on encrypted data, making it a powerful tool for cloud data security. CogniGate Protocol enables more flexibility and control over access to cloud data by allowing for fine-grained limitations on access depending on user parameters. Index trees provide an efficient data structure for storing and retrieving encrypted data, while blockchain key management ensures the secure and decentralized storage of encryption keys. Performance evaluation focuses on key aspects, including computation cost for the data owner, computation cost for data sharers, the average time cost of index construction, query consumption for data providers, and time cost in key generation. The results highlight that the integrated approach safeguards cloud data while preserving privacy, maintaining usability, and demonstrating high performance. In addition, we explore the role of differential privacy in our integrated approach, showing how it can be used to further enhance privacy protection without compromising performance. We also discuss the key management challenges associated with our approach and propose a novel blockchain-based key management system that leverages smart contracts and consensus mechanisms to ensure the secure and decentralized storage of encryption keys.

A Study on Transport Protocol for High Speed Networking

  • Kwon, Yoon-Joo;Seok, Woo-Jin;Byeon, Ok-Hwan
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.211-214
    • /
    • 2005
  • There are emerging many eScience applications. More and more scientists want to collaborate on their investigation with international partners without space limitation by using these applications. Since these applications have to analyze the massive raw data, scientists need to send and receive the data in short time. So today's network related requirement is high speed networking. The key point of network performance is transport protocol. We can use TCP and UDP as transport protocol but we use TCP due to the data reliability. However, TCP was designed under low bandwidth network, therefore, general TCP, for example Reno, cannot utilize the whole bandwidth of high capacity network. There are several TCP variants to solve TCP problems related to high speed networking. They can be classified into two groups: loss based TCP and delay based TCP. In this paper, I will compare two approaches of TCP variants and propose a hybrid approach for high speed networking.

  • PDF

An Entropy-Based Routing Protocol for Supporting Stable Route Life-Time in Mobile Ad-hoc Wireless Sensor Networks (모바일 Ad-hoc 무선 센서 네트워크에서 안정된 경로의 Life-Time을 지원하기 위한 엔트로피 기반의 라우팅 프로토콜)

  • An, Beong Ku;Lee, Joo Sang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.31-37
    • /
    • 2008
  • In this paper, we propose an entropy-based routing protocol to effectively support both stable route construction and route lifetime in Mobile Ad-hoc Wireless Sensor Networks (MAWSN). The basic idea and feature of the proposed routing protocol are as follows. First, we construct the stable routing routes based on entropy concept using mobility of mobile nodes. Second, we consider a realistic approach, in the points of view of the MAWSN, based on mobile sensor nodes as well as fixed sensor nodes in sensor fields while the conventional research for sensor networks focus on mainly fixed sensor nodes. The performance evaluation of the proposed routing protocol is performed via simulation using OPNET(Optimized Network Engineering Tool) and analysis. The results of the performance evaluation show that the proposed routing protocol can efficiently support both the construction of stable route and route lifetime in mobile ad-hoc wireless networks.

  • PDF

PCBRP : Improved Paired Cluster-Based Routing Protocol in The Mobile Ad-Hoc Network (PCBRP : 모바일 애드혹 네트워크에서 클러스터 쌍을 이용한 효율적인 Cluster-Based Routing Protocol)

  • Kim, ChangJin;Kim, Wu Woan;Jang, Sangdong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.31-34
    • /
    • 2012
  • In MANET, frequent movement of nodes causes the dynamic network topology changes. Therefore the routing protocol, which is very stable to effectively respond the changes of the network changes, is required. Moreover, the existing cluster-based routing protocol, that is the hybrid approach, has routing delay due to the re-electing of the cluster header. In addition, the routing table of CBRP has all only one hop distant neighbor nodes. PCBRP, proposed in this paper, ties two clusters in one pair of clusters to make longer radius. Then the pair of the cluster headers manages and operates corresponding member nodes. When they route nodes in the paired cluster internally, PCBRP reduces the delay by requesting a route. Therefore PCBRP shows improved total delay of the network and improved performance of packet transmitting rate.

  • PDF

Hop Based Gossiping Protocol (HoGoP) for Broadcasting Message Services in Wireless Sensor Networks (무선 센서 망에서 브로드캐스팅 메시지 서비스를 위한 홉 기반 가십 프로토콜)

  • So, Won-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1B
    • /
    • pp.144-153
    • /
    • 2010
  • Flooding based routing protocols are usually used to disseminate information in wireless sensor networks. Those approaches, however, require message retransmissions to all nodes and induce huge collision rate and high energy consumption. In this paper, HoGoP (Hop based Gossiping Protocol) in which all nodes consider the number of hops from sink node to them, and decide own gossiping probabilities, is introduced. A node can decide its gossiping probability according to the required average reception percentage and the number of parent nodes which is counted with the difference between its hop and neighbors' ones. Therefore the decision of gossiping probability for network topology is adaptive and this approach achieves higher message reception percentage with low message retransmission than the flooding scheme. Through simulation, we compare the proposed protocol with some previous ones and evaluate its performance in terms of average reception percentage, average forwarding percentage, and forwarding efficiency. In addition, average reception percentage is analyzed according to the application requirement.

Guidelines for Cardiovascular Magnetic Resonance Imaging from Korean Society of Cardiovascular Imaging (KOSCI) - Part 1: Standardized Protocol

  • Jo, Yeseul;Kim, JeongJae;Park, Chul Hwan;Lee, Jae Wook;Hur, Jee Hye;Yang, Dong Hyun;Lee, Bae Young;Im, Dong Jin;Hong, Su Jin;Kim, Eun Young;Park, Eun-Ah;Kim, Pan Ki;Yong, Hwan Seok
    • Investigative Magnetic Resonance Imaging
    • /
    • v.23 no.4
    • /
    • pp.296-315
    • /
    • 2019
  • Cardiac magnetic resonance (CMR) imaging is widely used in many areas of cardiovascular disease assessment. This is a practical, standard CMR protocol for beginners that is designed to be easy to follow and implement. This protocol guideline is based on previously reported CMR guidelines and includes sequence terminology used by vendors, essential MR physics, imaging planes, field strength considerations, MRI-conditional devices, drugs for stress tests, various CMR modules, and disease/symptom-based protocols based on a survey of cardiologists and various appropriate-use criteria. It will be of considerable help in planning and implementing tests. In addressing CMR usage and creating this protocol guideline, we particularly tried to include useful tips to overcome various practical issues and improve CMR imaging. We hope that this document will continue to standardize and simplify a patient-based approach to clinical CMR and contribute to the promotion of public health.

Improved Cluster-Based Routing Protocol Using Paired-header of Cluster in The Mobile Ad-Hoc Network (모바일 애드혹 네트워크에서 클러스터의 페어 헤드 노드를 이용한 향상된 CBRP)

  • Kim, ChangJin;Kim, Wu Woan;Jang, Sangdong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.1
    • /
    • pp.56-66
    • /
    • 2013
  • In MANET, the frequent movement of nodes causes the dynamic network topology changes. Therefore, it is required that the routing protocol should be very stable to effectively respond the changes of the network changes. Moreover, the existing cluster-based routing protocol, that is the hybrid approach, has routing delay due to the re-electing of the cluster header. In addition, the routing table of CBRP has all only one hop distant neighbor nodes. PCBRP, proposed in this paper, ties two clusters in one paired cluster to make longer radius. Then the headers of the paired cluster manage and operate corresponding member nodes. In the current CBRP, when the cluster header leaves out the cluster, the delay, due to the re-electing a header, should be occurred. However, in PCBRP, another cluster header of the paired cluster plays the role instead of the left cluster header. This method reduces the routing delay. Concurrently, PCBRP reduces the delay when they route nodes in the paired cluster internally.

Real-time Data Integration using Ontology and Semantic Mediators (온톨로지와 시맨틱 중재 에이전트를 이용한 실시간 통합 환경 구축에 관한 연구)

  • Park, Jin-Soo
    • Asia pacific journal of information systems
    • /
    • v.16 no.4
    • /
    • pp.151-178
    • /
    • 2006
  • The objective of this research is to develop a formal framework and methodology to facilitate real-time data integration, thus enabling semantic interoperability among distributed and heterogeneous information systems. The proposed approach is based on the concepts of "ontology" and "semantic mediators." An ontology is developed and used to capture the intension (including structure, integrity rules and meta-properties) of the database schema. We also develop the agent communication protocol for semantic reconciliation, which is based on the theory of speech acts and agent communication language. This protocol is used by a set of semantic mediators, which automatically detect and resolve various semantic conflicts at the data- and schema-levels by referring to the ontology. A mediation-based query processing technique is developed to provide uniform and integrated access to the multiple heterogeneous information sources. Prototype tools are being implemented to provide proof of concept for this work.

A Brief Consideration on the Security of Hash-Based Authenticator (해시 기반 인증자 안전성 고찰)

  • Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.609-612
    • /
    • 2016
  • Authenticated key exchange protocol achieves its authentication by using hash-based authenticator with input of common message and session key that agrees between participants. In the letter, we show that this approach cannot satisfy the entire security, through a recent example protocol that is proposed by Tsai et al, 2014, if the input of authenticator has been insecurely designed.