{"title":"Survey on Cloud Data Integrity Proof Techniques","authors":"S. G. Worku, Z. Ting, Zhiguang Qin","doi":"10.1109/AsiaJCIS.2012.22","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2012.22","url":null,"abstract":"Proof of Retrievability (POR) and Provable Data Possession (PDP) systems these days are the most active area of research for data integrity check, which is outsourced to cloud service providers. In this work we surveyed data integrity proving schemes by reviewing different schemes in the area along with their efficiency and security considerations. The objective of this survey is to offer a state-of-the-art knowledge for new researchers, who are interested in this specific area, i.e., it helps in understanding the research work carried out for the last few years.","PeriodicalId":130870,"journal":{"name":"2012 Seventh Asia Joint Conference on Information Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131057174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen, C. Lei
{"title":"An Analysis of Security Patch Lifecycle Using Google Trend Tool","authors":"Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen, C. Lei","doi":"10.1109/AsiaJCIS.2012.12","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2012.12","url":null,"abstract":"Information security audit has become more and more important nowadays. Among the audited items, the status of security patch could be the most important part. In this paper, we proposed a security patch lifecycle to assess the information security risk with the help of vulnerability databases. A case study using the Google Trend is also given to demonstrate that the proposed security patch lifecycle is both useful and practical.","PeriodicalId":130870,"journal":{"name":"2012 Seventh Asia Joint Conference on Information Security","volume":"890 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123256438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kuo-Hui Yeh, N. Lo, Tzong-Chen Wu, T. Yang, H. Liaw
{"title":"Analysis of an eHealth Care System with Smart Card Based Authentication","authors":"Kuo-Hui Yeh, N. Lo, Tzong-Chen Wu, T. Yang, H. Liaw","doi":"10.1109/AsiaJCIS.2012.17","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2012.17","url":null,"abstract":"In recent years, smart card based authentication has been massively adopted in the electronic health care and medical treatment services in which the user and administrator can agree a robust session key based on human-memorable passwords with the hospital server. In this paper, we investigate the robustness of an eHealth care system with smart card based authentication mechanisms. This research is from International Journal of Innovative Computing, Information and Control in 2011, and its out-standing contribution and rigorous analysis make itself one of the most promising techniques in the research area of secure eHealth care services. However, it still exist spaces for security enhancement, therefore, we present the analysis of this research and de-liver contributions in the design of the secure eHealth care application development.","PeriodicalId":130870,"journal":{"name":"2012 Seventh Asia Joint Conference on Information Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124829632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Naoki Hiroguchi, Khamphao Sisaat, Hiroaki Kikuchi, S. Kittitornkun
{"title":"Geographical Visualization of Malware Download for Anomaly Detection","authors":"Naoki Hiroguchi, Khamphao Sisaat, Hiroaki Kikuchi, S. Kittitornkun","doi":"10.1109/AsiaJCIS.2012.20","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2012.20","url":null,"abstract":"We study a linkage between attacks in cyberspace and incidents in our real world. For example, the Internet had been closed down in Egypt for preventing protests against President Hosni Mubarak. Meanwhile, for more than two weeks we have observed that no port-scan packet were sent from Egypt to Japan. This motivates us for this study to find any incident between botnet attacks which were involved many vulnerable servers and the real events occurred in the world. For this purpose, we developed the virtualization system on Google Earth service for plotting source IP addresses of botnet communications. We investigated the actual malware downloading events observed by more than 70 distributed honey pots in the Japanese backbone network. In order to automate the detection process, we study some anomaly detection schemes base on the entropy of honey pot activities. Our analysis shows some evidences that botnet attacks are involved in our real world.","PeriodicalId":130870,"journal":{"name":"2012 Seventh Asia Joint Conference on Information Security","volume":"2008 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125584942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Lossless Data Hiding Scheme on VQ Index Coding","authors":"Chin-Feng Lee, Ming-Chi Shih, Cheng-Ta Huang","doi":"10.1109/AsiaJCIS.2012.8","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2012.8","url":null,"abstract":"Loss less data hiding can extract the embedded secret data and restore the cover media to its original status. Wang et al. in 2010 proposed a loss less data hiding method to embed secret message on VQ indices but their scheme has the encoded bit stream over-expanded. This paper improves their embedding approach by employing the index clusters with localization to enhance the similarity of adjacent indices and to improve the compressing code strem arrangement for effectively reducing the bit rates of final code stream.","PeriodicalId":130870,"journal":{"name":"2012 Seventh Asia Joint Conference on Information Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122872651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reversible Data Hiding for JPEG Based on EMD","authors":"W. Kuo, S. Kuo","doi":"10.1109/AsiaJCIS.2012.7","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2012.7","url":null,"abstract":"To save communication bandwidth, data compression method usually is used when the stego-image transmits. To defend data security, the data hiding technology is used in the data communication. However, it seems that there is no relationship between data compression and data hiding. Actually, they are closely related. Until now, many data hiding schemes had been proposed in literatures. Unfortunately, the stego-image size will be increased after the secret data is hidden. In order to overcome this disadvantage, a reversible data hiding for JEPG based on EMD will be proposed in this paper. According to the experimental results, we can prove that our proposed scheme still keeps high embedding capacity, security and good compression ratio.","PeriodicalId":130870,"journal":{"name":"2012 Seventh Asia Joint Conference on Information Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134090871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation","authors":"Tsubasa Tsukaune, Yosuke Todo, M. Morii","doi":"10.1109/AsiaJCIS.2012.11","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2012.11","url":null,"abstract":"WEP is a security protocol in a wireless LAN network. However its vulnerability has been pointed out, and many key recovery attacks against WEP were proposed by using it. Some attacks can retrieve a WEP key easily by observing about 20,000 packets. In order to avoid such attack, we have to update the WEP key whenever the number of communicated packets exceeds a certain threshold. For immunizing against key recovery attacks, it is the best way to update the key every 10,000 packets. However 10,000 packets are very few, so it is not realistic. In this paper, we propose a secure WEP operation against key recovery attacks. The proposed method requires for attackers at least 100,000 packets to recover the WEP key. Furthermore we theoretically evaluate our technique to operate a secure WEP communication.","PeriodicalId":130870,"journal":{"name":"2012 Seventh Asia Joint Conference on Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131272396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast-Refreshing Tree-Based Group Key Agreement for Mobile Ad Hoc Networks","authors":"Chung-Wei Chen, Shiuh-Jeng Wang, Yuh-Ren Tsai, Hsing-Chung Chen","doi":"10.1109/AsiaJCIS.2012.16","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2012.16","url":null,"abstract":"With the proliferation of group-oriented applications in mobile ad hoc networks (MANETs), users need suitable group key agreements to secure communication between group members. Because of users' mobility, group members join their group or leave frequently in MANETs. Due to each MANET has a unique, specific purpose, there typically is no central management mechanism. The utilization of resource, such as bandwidth, is limited. Furthermore, a user's wireless device is usually equipped only with limited battery power. Consequently, power consumption also affects the life period of a MANET. Due to these challenges, MANETs require a group key agreement which can generate and refresh a group key quickly and efficiently. In this paper, we propose a Fast-reacting Tree-based Group key agreement for MANETs, FTG-M, which supports efficient message transmission and low communication overhead in order to refresh group keys quickly. In addition, we utilize a new idea, a virtual tree, to reduce communication overhead. We compare the performance of FTG-M with other schemes, so as to show the reduction of communication and computation overhead.","PeriodicalId":130870,"journal":{"name":"2012 Seventh Asia Joint Conference on Information Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125871745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strong Tamper-Localization, Visual Secret Sharing Scheme Based on Exploiting Modification Direction","authors":"Chinchen Chang, Ngoc-Tu Huynh, Chia-Chun Lin","doi":"10.1109/AsiaJCIS.2012.9","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2012.9","url":null,"abstract":"Recently, protecting information that is shared or transmitted over the Internet has become a critical issue. Several ways to transfer secret data have been proposed, including visual secret sharing (VSS), which is an efficient technique because the secret data are kept by a group of participants, rather than one person, so that they cannot be lost. In this paper, we proposed a new, visual, secret-sharing method with high quality shadows by smartly employing a steganography method, called Exploiting Modification Direction (EMD), during share construction. In addition, the scheme can detect if any tampering has occurred on the shadow. Our experimental results show that the scheme is efficient and secure.","PeriodicalId":130870,"journal":{"name":"2012 Seventh Asia Joint Conference on Information Security","volume":"356 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121711395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}