{"title":"Towards healthcare data security in cloud computing","authors":"H. Elmogazy, Omaima Bamasak","doi":"10.1109/ICITST.2013.6750223","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750223","url":null,"abstract":"Healthcare data has stringent security requirements for confidentiality, availability to authorized users, and traceability of access. The focus of this study is to investigate on these requirements and propose a solution for healthcare cloud providers that will help in protecting patient' data they host, which is of high importance. The focus will be on specific cloud computing healthcare security concerns and how cloud homomorphic encryption with splitting key and key delegation can help in meeting healthcare regulatory requirements. The suggested technique is based on FHE algorithm with key delegation to ensure data confidentiality, authentication, integrity, and availability in a multi-level hierarchical order. This will enable the healthcare provider to apply/omit any access rule in any order, especially in medical research environment.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127836371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Arachchilage, Cornelius Namiluko, Andrew P. Martin
{"title":"A taxonomy for securely sharing information among others in a trust domain","authors":"N. Arachchilage, Cornelius Namiluko, Andrew P. Martin","doi":"10.1109/ICITST.2013.6750210","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750210","url":null,"abstract":"In any given collaboration, information needs to flow from one participant to another. While participants may be interested in sharing information with one another, it is often necessary for them to establish the impact of sharing certain kinds of information. This is because certain information could have detrimental effects when it ends up in wrong hands. For this reason, any would-be participant in a collaboration may need to establish the guarantees that the collaboration provides, in terms of protecting sensitive information, before joining the collaboration as well as evaluating the impact of sharing a given piece of information with a given set of entities. The concept of a trust domains aims at managing trust-related issues in information sharing. It is essential for enabling efficient collaborations. Therefore, this research attempts to develop a taxonomy for trust domains with measurable trust characteristics, which provides security-enhanced, distributed containers for the next generation of composite electronic services for supporting collaboration and data exchange within and across multiple organisations. Then the developed taxonomy is applied to a possible scenario, in which the concept of trust domains could be useful.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124337638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characteristics analysis for the cyberlockers files study on Rapidgator Speedyshare and 1Fichier","authors":"Nan Zhao, L. Baud, P. Bellot","doi":"10.1109/ICITST.2013.6750187","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750187","url":null,"abstract":"As the bandwidth of Internet rises from ISPs, the proportion of different Internet traffic and underling services have changed. There is about 20% decrease of the P2P traffic compared to an increase of more than 10% of the traffic of cyberlockers services, which are websites providing direct file download functionalities. In this paper we present a recent study over three cyberlockers: Rapidgator, Speedyshare and 1Fichier. Compared to prior studies, we applied a bias-free sampling method to randomly gather hosted files on the three cyberlockers. We aim at figuring out the characteristics of the hosted files on cyberlockers. In our work, we analysed and estimated the total number of files and the total size of files on these three cyberlockers. We specifically discussed the file size and file number distribution of hosted files in different file format and file content. Our results show that split-compressed files take a large part of the volume; there are many raw files on cyberlockers. Additionally, the results point that Rapidgator and 1Fichier are used to host entertainment and professional files while Speedyshare is mainly used to host private files.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129949366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Asma Hamed, Hella Kaffel Ben Ayed, M. Kâafar, A. Kharraz
{"title":"Evaluation of third party tracking on the web","authors":"Asma Hamed, Hella Kaffel Ben Ayed, M. Kâafar, A. Kharraz","doi":"10.1109/ICITST.2013.6750244","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750244","url":null,"abstract":"In this paper our goal is to measure the presence of trackers and tracking components in websites to identify their dangerousness to privacy.We propose an intuitive privacy scoring model to quantify the use of tracking techniques and identify how users activities are tracked when they are online. We developeded and distributed a firefox add-on that collects the web browsing history of our volunteers along with the detected tracking components and computes the scores of the visited web page. Using our collected dataset, we examine the tracking capabilities in the wild. Our findings show that while cookies-based tracking is present in almost all websites, independently from the content and from the audience, JavaScripts are also present and can also be a major vector of web tracking. We demonstrate that the trackers dangerousness for the user's privacy should not be measured by the number of components but by their presence through the websites and the domains. Correlation was also found between scores and tracking components which confirms that our intuitive scoring model is realistic.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130724052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A reference architecture for big data solutions introducing a model to perform predictive analytics using big data technology","authors":"B. Geerdink","doi":"10.1109/ICITST.2013.6750165","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750165","url":null,"abstract":"With big data technology and predictive analytics techniques, organizations can now register, combine, process and analyze data to answer questions that were unsolvable a few years ago. This paper introduces a solution reference that gives guidance to organizations that want to innovate using big data technology and predictive analytics techniques for improving their performance. The reference architecture is the result of an iteration of Hevner's framework for designing information systems artifacts.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125707030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hyun-Hwa Choi, Byoung-Seob Kim, Shinyoung Ahn, Seung-Jo Bae
{"title":"A workflow for parallel and distributed computing of large-scale genomic data","authors":"Hyun-Hwa Choi, Byoung-Seob Kim, Shinyoung Ahn, Seung-Jo Bae","doi":"10.1109/ICITST.2013.6750194","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750194","url":null,"abstract":"Workflow management systems are emerging as dominant solution in bioinformatics because they enable researchers to analyze the huge amount of data generated by modern laboratory equipment. The growth of genomic data generated by next generation sequencing (NGS) results in an increasing need to analyze data on distributed computer clusters. In this paper, we construct a semi-automated workflow system for the analysis of large-scale sequence data sets, describe a pipeline designed with parallel computation to perform the optimal computational steps required to analyze whole genome sequence data, and report the overall execution time of the pipeline using cores on multiple machines.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121260103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SecureDIS: A framework for secure Data Integration Systems","authors":"Fatimah Y. Akeel, G. Wills, A. Gravell","doi":"10.1109/ICITST.2013.6750270","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750270","url":null,"abstract":"With the web witnessing an immense shift towards publishing data, integrating data from diverse sources that have heterogeneous security levels become even more challenging. There is a need to maintain security and privacy requirements of each data source participating in a data integration process before and during the integration. In Data Integration Systems (DIS) for critical domains, data needs to be dynamically collected from multiple sources to contain the problem and make faster decisions. Therefore, it is essential to consider Security, Privacy and Trust (SPT) in such a system. However, the literature lacks this comprehensive perspective; therefore, this paper presents a novel framework of SPT requirements that assist software engineers in building a secure DIS.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127616480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. J. Ontanon-Garcia, M. Garcia-Martinez, E. Campos-Cantón, S. Čelikovský
{"title":"Grayscale image encryption using a hyperchaotic unstable dissipative system","authors":"L. J. Ontanon-Garcia, M. Garcia-Martinez, E. Campos-Cantón, S. Čelikovský","doi":"10.1109/ICITST.2013.6750252","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750252","url":null,"abstract":"Here we use a pseudo-random bit generator based on a hyperchaotic unstable dissipative system suitable for encryption. This type of system presents saddle hyperbolic equilibrium points with eigenvalues as follows: two negative real eigenvalue, and one pair of complex conjugated eigenvalues with positive real part. The hyperchaotic system in R4 is binarized in order to generate a pseudo-random sequence, that is used to encrypt binary information of a grayscale image via symmetric-key algorithm.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133464927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. J. Gabriel, B. K. Alese, O. Adebayo, O. Adewale
{"title":"Post-Quantum Crystography: A combination of Post-Quantum Cryptography and Steganography","authors":"A. J. Gabriel, B. K. Alese, O. Adebayo, O. Adewale","doi":"10.1109/ICITST.2013.6750240","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750240","url":null,"abstract":"Crystography is the combination of Cryptography and Steganography for enhancing the security of communications over enterprise networks. Most existing Crystographic systems are based on Public key Cryptographic schemes like RSA and Elliptic Curve Cryptography (ECC), whose security depends on the difficulty of solving Integer Factorisation Problem (IFP) and Discrete Logarithm problem (DLP) respectively. However, techniques for solving IFP and DLP problems, improves continually. Therefore, the existence of Quantum Computers in the range of 1000 bits would be a real world threat to systems based on those problems. This paper thus propose a new Crystographic System that combines Post Quantum Cryptography with Steganography to ensure that security of communication is maintained both in Classical Computing era as well as Post-Quantum Computing era.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"875 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113999242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SV-2FA: Two-factor user authentication with SMS and voiceprint challenge response","authors":"Haruhiko Fujii, Y. Tsuruoka","doi":"10.1109/ICITST.2013.6750207","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750207","url":null,"abstract":"Two-step authentication, which uses SMS or voice calls, is becoming more practical for user authentication or for preventing phishing attack. However, conventional methods have vulnerabilities to man-in-the-middle or social-engineering attack or cellphone theft. As a general problem, it is difficult to prevent a legitimate user's denial. Therefore, we propose a secure user authentication method that uses a onetime phone number sent by SMS and oath and voiceprint authentication through voice calls. This method solves the above-mentioned problem and is easy to use since it can be used with any cellphone.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"551 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114088303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}