Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices - SPSM '13

2013 ◽  
Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


Author(s):  
Darshan M. Tank

With the development of cloud computing and mobility, mobile cloud computing has emerged and become a focus of research. Mobile Cloud Computing (MCC) integrates mobile computing and cloud computing aiming to extend mobile devices capabilities. By the means of on-demand self-service and extendibility, it can offer the infrastructure, platform, and software services in a cloud to mobile users through the mobile network. There is huge market for mobile based e-Commerce applications across the globe. Security and privacy are the key issues for mobile cloud computing applications. The limited processing power and memory of a mobile device dependent on inherently unreliable wireless channel for communication and battery for power leaves little scope for a reliable security layer. Thus there is a need for a lightweight secure framework that provides security with minimum communication and processing overhead on mobile devices. The security and privacy protection services can be achieved with the help of secure mobile-cloud application services.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Fenio Annansingh

Purpose Currently, one of the most significant challenges organizations face is that corporate data is being delivered to mobile devices that are not managed by the information technology department. This has security implications regarding knowledge leakage, data theft, and regulatory compliance. With these unmanaged devices, companies have less control and visibility, and fewer mitigation options when protecting against the risks of cyber-attacks. Therefore, the purpose of this study is to investigate how millennials' use of personal mobile devices for work contributes to increased exposure to cyber-attacks and, consequently, security and knowledge leakage risks. Design/methodology/approach This research used a mixed-method approach by using survey questionnaires to elicit the views of millennials regarding the cybersecurity risks associated with bring your own device policies and practices. Interviews were done with security personnel. Data analysis consisted of descriptive analysis and open coding. Findings The results indicate that millennials expect to have ready access to technology and social media at all times, irrespective of security and privacy concerns. Companies also need to improve and enforce bring your own device policies and practices to mitigate against knowledge leakage and security risks. Millennials increasingly see the use of personal devices as a right and not a convenience. They are expecting security measures to be more seamless within the full user experience. Originality/value This paper can help organizations and millennials to understand the security risks entering the workforce if the threats of using privately owned devices on the job are ignored and to improve organizational performance.


Author(s):  
Michael Hölzl ◽  
Endalkachew Asnake ◽  
Rene Mayrhofer ◽  
Michael Roland

Purpose – The purpose of this paper is to design, implement and evaluate the usage of the password-authenticated secure channel protocol SRP to protect the communication of a mobile application to a Java Card applet. The usage of security and privacy sensitive systems on mobile devices, such as mobile banking, mobile credit cards, mobile ticketing or mobile digital identities has continuously risen in recent years. This development makes the protection of personal and security sensitive data on mobile devices more important than ever. Design/methodology/approach – A common approach for the protection of sensitive data is to use additional hardware such as smart cards or secure elements. The communication between such dedicated hardware and back-end management systems uses strong cryptography. However, the data transfer between applications on the mobile device and so-called applets on the dedicated hardware is often either unencrypted (and interceptable by malicious software) or encrypted with static keys stored in applications. Findings – To address this issue, this paper presents a solution for fine-grained secure application-to-applet communication based on Secure Remote Password (SRP-6a and SRP-5), an authenticated key agreement protocol, with a user-provided password at run-time. Originality/value – By exploiting the Java Card cryptographic application programming interfaces (APIs) and minor adaptations to the protocol, which do not affect the security, the authors were able to implement this scheme on Java Cards with reasonable computation time.


2020 ◽  
Vol 5 (1) ◽  
pp. 172-192
Author(s):  
Ezequiel Santos Silva ◽  
Luiz Fernando Batista Loja ◽  
Diego Arantes Teixeira Pires

Resumo: Atualmente, existe uma preocupação em relação ao processo de ensino-aprendizagem de alguns conceitos científicos, como os conceitos iniciais de Química Orgânica, vistos no terceiro ano do Ensino Médio. Uma das alternativas para solucionar esse problema tem sido construir e apontar materiais didáticos para incrementar a metodologia das aulas ministradas pelos professores de Ciências. Alguns desses materiais, que podem contribuir com o êxito no processo de ensino-aprendizagem são os softwares lúdicos educacionais. Neste trabalho, apresentamos um aplicativo didático que foi desenvolvido, denominado Quiz Molecular, para dispositivos móveis, abordando o conteúdo de funções orgânicas. Além disso, relatou-se a aplicação, avaliação e validação do jogo com alunos de uma escola estadual de Ensino Médio e licenciandos em Química de uma instituição federal de ensino, utilizando-se questionários com perguntas objetivas e discursivas, em uma pesquisa qualitativa. Notou-se que o jogo proposto agradou aos alunos de Ensino Médio e aos futuros professores, demonstrando que pode ser uma boa alternativa para dinamizar as aulas de Química Orgânica.Palavras-chave: Tecnologias no Ensino; Ensino de Química; Química Orgânica. Abstract: Currently, there is a concern about the teaching-learning process of some scientific concepts, such as the initial concepts of Organic Chemistry, seen in the third year of high school. One of the alternatives to solve this problem has been to build and to point teaching materials to increase the methodology of the classes. Some of these materials, which can contribute to the success of the teaching-learning process, are educational software. In this work, an educational app for mobile devices was developed, named Molecular Quiz, and it addressed the content of organic functions.  It is also reported its application and validation with high school and graduation students. For theses analysis, it was used questionnaires with objective and discursive questions. It was noted that the proposed game pleased students and future teachers, demonstrating that it can be a good alternative to dynamize Organic Chemistry classes. In addition, the app has been validated as an educational game.Keywords: Educational Technologies; Chemistry teaching; Organic chemistry.


Implementing cloud computing provides many paths for web-based service. But, data security and privacy requirement become an important problem that limits several cloud applications. One of the key security and privacy concerns is the fact that cloud service suppliers have access to data. This concern greatly reduces the usability of cloud computing in many areas, such as financial business and government agencies. This paper focuses on this important issue and suggests a new approach, so cloud providers cannot directly access data. The proposed approach is divided into two sides: upload side and download side. In upload side, there is three stages, at the first stage; the transmitted file is splitted and then encrypted in order to achieve the data security requirement. At the second stage, the splitted data are integrity checked by MD5 algorithm, in order to achieve integrity requirement. At the third stage, the checked splitted data are stored separately in three -clouds, in order to achieve distribution requirement. In download side, also there is three stages. At the first stage, the data is retrieved from the three-clouds. At the second stage, data integrity is performed using MD5. At the third stage, data decryption and merging are done. The proposed approach is successfully implemented on (25 KB) image. The proposed model is successfully implemented in uploading side dependent on shares3 because provide high security with total time of (8.144 sec), and in downloading side with total side of (9.42).


Sign in / Sign up

Export Citation Format

Share Document