Information-Centric Networking, E-Government, and Security

Author(s):  
Balkis Hamdane ◽  
Sihem Guemara El Fatmi

The internet was initially proposed to interconnect a few trusted hosts. However, its continued success has caused many security problems. New internet services, such as e-government, must address these security issues. A host-centric security model tied to information location and based on various partial corrections has been proposed. However, this model hasn't brought radical solutions and has largely contributed to architecture ossification. In this context, the idea of a clean slate approach, satisfying the new requirements and without any compatibility obligation, has emerged. The information-centric networking approach represents one of these architectures. Its main idea is to consider the named information as the central element rather than the IP addresses. To ensure security requirements, it adopts an information-centric security. This chapter is a survey on security in the ICN, satisfying the internet security requirements in general and particularly e-government services.

Author(s):  
Roumaissa Khelf ◽  
Nacira Ghoualmi-Zine ◽  
Marwa Ahmim

The goal of this work is to develop a key exchange solution for IPsec protocol, adapted to the restricted nature of the Internet of Things (IoT) components. With the emergence of IP-enabled wireless sensor networks (WSNs), the landscape of IoT is rapidly changing. Nevertheless, this technology has exacerbated the conventional security issues in WSNs, such as the key exchange problem. Therefore, Tiny Authenticated Key Exchange Protocol for IoT (TAKE-IoT) is proposed to solve this problem. The proposed TAKE-IoT is a secure, yet efficient, protocol that responds to several security requirements and withstands various types of known attacks. Moreover, TAKE-IoT aims to reduce computation costs using lightweight operations for the key generation. The proposed protocol is validated using the automated validation of internet security protocols and applications (AVISPA) tool. Hence, results show that TAKE-IoT can reach a proper level of security without sacrificing its efficiency in the context of IoT.


Author(s):  
Pappu Sowmya ◽  
R Kumar

Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet, while providing the privacy and security. By using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, ‘virtualization’ is one of the techniques dividing memory into different blocks. In most of the existing systems there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: 1) allotting the VSM(VM Security Monitor) model for each virtual machine; 2) providing secret keys to encrypt and decrypt information by symmetric encryption.The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model.


Author(s):  
Arram Sriram ◽  
Adiraju Prashantha Rao

E-commerce is selling and buying products in online shopping through the internet. When purchasing the products using internet, many security issues arise. These issues are to be addressed effectively and to be resolved. The security issue is an essential part of any transaction that takes place over the internet. Security becomes paramount not only for retailers but for any business that operates via the internet as the popularity of online shopping grows. This chapter focuses security protocols and their achievements in providing effective communication between end-users and business people.


Author(s):  
Ana-Maria CERNOV

Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. This paper presents the main issues regarding the network security issues and solutions to fight back the cyber-attacks.


2021 ◽  
Vol 18 (2) ◽  
pp. 247-256
Author(s):  
Sanja Klisarić

In a world of increasingly intense cyber content that relies on new technologies, the security of all systems is at risk. This article will present the danger and security options in order to protect not only data but also the entire system connected to the new technologies. Also, the importance of persons dealing with online security issues will be emphasized. The analysis of the content reveals the possibility for prediction that is presented in the paper, and connected with the conclusion that technology will develop more and more, and thus the danger of cyber attacks will be more and more intense. The paper focuses on the essence of the defense against terrorism that is necessary on the Internet. This indicates those defense options that are in line with the roles of those in charge of Internet security as an open field for terrorist cyber attacks.


Author(s):  
Arram Sriram ◽  
Adiraju Prashantha Rao

E-commerce is selling and buying products in online shopping through the internet. When purchasing the products using internet, many security issues arise. These issues are to be addressed effectively and to be resolved. The security issue is an essential part of any transaction that takes place over the internet. Security becomes paramount not only for retailers but for any business that operates via the internet as the popularity of online shopping grows. This chapter focuses security protocols and their achievements in providing effective communication between end-users and business people.


Author(s):  
Pauline C. Reich

While the benefits of the Internet and other forms of computer networks are streamlining financial institutions, the same institutions are often among the first institutions to be affected by Cybercrime and Cybersecurity issues due to the financial incentives as well as their strategic place in each nation’s infrastructure and economy. We must look not only at the efficiency, but also at the negative aspects of the use of technology by financial institutions. Consumers as well as business must be well informed about conducting transactions in the safest manner possible. The nature of the Internet is cross-border, and thus Cybercrime and Internet Security issues involving financial institutions should be made known by international organizations, regional organizations and when there have been cross-border law enforcement collaborations in investigations, extraditions, etc. At present, due to the fact that law is generally written at the national (or even state level, as is the case of Identity Theft law in the US), there is a need for reporting of cross-border cases in the literature if such data can be obtained from law enforcement officials by scholars.


2013 ◽  
Vol 846-847 ◽  
pp. 1600-1603
Author(s):  
Ao Qiu Pei ◽  
Min Yang ◽  
Yan Bin Tang

Cloud computing based on a large number of distributed computer gathers a wide variety of computing resources data and builds huge virtual resources space and provides information technology resources for the majority of computer users through the Internet. Security issues is one of the core elements which constrains the depth development of cloud computing. It also is the hot issue of research in this field. This paper first analyzes the architecture and threat signatures of cloud computing system and data application model based on the data of cloud computing and data security threat characteristics. It builds a data security implementation model under cloud computing. Based on this, it builds information security model of cloud computing strategy and analyzes configuration program of the model in the cloud computing.


Author(s):  
Balkis Hamdane ◽  
Rihab Boussada ◽  
Mohamed Elhoucine Elhdhili ◽  
Sihem Guemara El Fatmi

Named data networking (NDN) represents a promising clean slate for future internet architecture. It adopts the information-centric networking (ICN) approach that treats named data as the central element, leverages in-network caching, and uses a data-centric security model. This model is built mainly in the addition of a signature to each of the recovered data. However, the signature verification requires the appropriate public key. To trust this key, multiple models were proposed. In this article, the authors analyze security and trust in NDN, to deduct the limits of the already proposed solutions. They propose a security extension that strengthens security and builds trust in used keys. The main idea of this extension is the derivation of these keys from data name, by using hierarchical identity-based cryptography (HIBC). To confirm the safety of the new proposal, a formal security analysis is provided. To evaluate its efficiency, a performance evaluation is performed. It proves that by adopting the proposed extension, performance is comparable, even better in some cases than plain NDN.


Sign in / Sign up

Export Citation Format

Share Document