Supporting dynamic updates in storage clouds with the Akl–Taylor scheme

2017 ◽  
Vol 387 ◽  
pp. 56-74 ◽  
Author(s):  
Arcangelo Castiglione ◽  
Alfredo De Santis ◽  
Barbara Masucci ◽  
Francesco Palmieri ◽  
Xinyi Huang ◽  
...  
2018 ◽  
Vol 7 (1.9) ◽  
pp. 200
Author(s):  
T A.Mohanaprakash ◽  
J Andrews

Cloud computing is associate inclusive new approach on however computing services square measure made and utilized. Cloud computing is associate accomplishment of assorted styles of services that has attracted several users in today’s state of affairs. The foremost enticing service of cloud computing is information outsourcing, because of this the information homeowners will host any size of information on the cloud server and users will access the information from cloud server once needed. A dynamic outsourced auditing theme that cannot solely defend against any dishonest entity and collision, however conjointly support verifiable dynamic updates to outsourced information. The new epitome of information outsourcing conjointly faces the new security challenges. However, users might not totally trust the cloud service suppliers (CSPs) as a result of typically they may be dishonest. It's tough to work out whether or not the CSPs meet the customer’s expectations for information security. Therefore, to with success maintain the integrity of cloud information, several auditing schemes are projected. Some existing integrity ways will solely serve for statically archived information and a few auditing techniques is used for the dynamically updated information. The analyzed numerous existing information integrity auditing schemes together with their consequences.


2016 ◽  
Vol 36 ◽  
pp. 127-151 ◽  
Author(s):  
Peter Ruckebusch ◽  
Eli De Poorter ◽  
Carolina Fortuna ◽  
Ingrid Moerman

2013 ◽  
Vol 9 (1) ◽  
pp. 44 ◽  
Author(s):  
Raghav V. Sampangi ◽  
Srinivas Sampalli

Radio Frequency Identification (RFID) is a technology that is very popular due to the simplicity in its technology and high adaptability in a variety of areas. The simplicity in the technology, however, comes with a caveat – RFID tags have severe resource restrictions, which make them vulnerable to a range of security attacks. Such vulnerability often results in the loss of privacy of the tag owner and other attacks on tags. Previous research in RFID security has mainly focused on authenticating entities such as readers / servers, which communicate with the tag. Any security mechanism is only as strong as the encryption keys used. Since RFID communication is wireless, critical messages such as key exchange messages are vulnerable to attacks. Therefore, we present a mutual authentication protocol that relies on independent generation and dynamic updates of encryption keys thereby removing the need for key exchange, which is based on the concept of gene mutation and transfer. We also present an enhanced version of this protocol, which improves the security offered by the first protocol. The novelty of the proposed protocols is in the independent generation, dynamic and continuous updates of encryption keys and the use of the concept of gene mutation / transfer to offer mutual authentication of the communicating entities. The proposed protocols are validated by simulation studies and security analysis.


2017 ◽  
Vol 13 (3) ◽  
pp. 1-25 ◽  
Author(s):  
Allan Borodin ◽  
Aadhar Jain ◽  
Hyun Chul Lee ◽  
Yuli Ye

Author(s):  
Abdelfetah Saadi ◽  
Youcef Hammal ◽  
Mourad Chabane Oussalah

Software applications are composed of a set of interconnected software components running on different machines. Most of these applications have a dynamic nature and need to reconfigure structure and behavior at run-time. The dynamic reconfiguration of software is a problem that must be dealt with. Reconfiguring this kind of applications is a complicated task and risks to take software at an undesirable situation. In this paper, the authors present a solution whose objective is to provide a complete support for reconfiguring and formally verifying consistency of dynamic updates of software before performing them. The aim is to provide highly available systems with the ability to safely modify their structure and behavior at run-time. The proposed approach is based mainly on the use of the meta-model concept for reconfiguration structural checking, and the CSP language, refinement technique, and the FDR model checking tool for the verification of reconfiguration behavioral consistency. The authors have also developed a tool prototype that validates and implements their proposals.


Sign in / Sign up

Export Citation Format

Share Document