scholarly journals General Multimedia Trust Authentication Framework for 5G Networks

2018 ◽  
Vol 2018 ◽  
pp. 1-9 ◽  
Author(s):  
Ling Xing ◽  
Qiang Ma ◽  
Honghai Wu ◽  
Ping Xie

Due to the varieties of services and the openness of network architectures, great challenges for information security of the 5G systems are posed. Although there exist various and heterogeneous security communication mechanisms, it is imperative to develop a more general and more ubiquitous authentication method for data security. In this paper, we propose for the 5G networks a novel multimedia authentication framework, which is based upon the trusted content representation (TCR). The framework is general and suitable for various multimedia contents, e.g., text, audio, and video. The generality of the framework is achieved by the TCR technique, which authenticates the contents’ semantics in both high and low levels. Analysis shows that the authentication framework is able to authenticate multimedia contents effectively in terms of active and passive authenticating ways.

2021 ◽  
Vol 6 (2) ◽  
Author(s):  
Iyos Rosidin Pajar

The issue of data security seems to be one of the most intriguing topics to observe in the development of information technology in recent time/. The information technology related to the management processes, one of which is the SIMAK application at   the University of Siliwangi needs a higher security concern. This study aims to determine the level of security of the SIMAK application in which the researchers can provide recommendations to SIMAK managers. This could be the basis for the future improvements. Researchers used 4 domains from ISO / IEC 27002: 2013, namely domain 5, it contains information security policies. Domain 6, it contains organizational information security. Domain 9, it contains access control. Lastly, Domain 11, it contains physical and environmental security.  When they are specified from the four domains, 38 controls are obtained. Security, from the results of the questionnaire and weighting, the result of the 5 domains maturity value is= 1.49, the result of the domain 6 maturity value is= 1.52, while domain 9 maturity value is= 1.32 and domain 11 maturity value constitute to 1.97.  If it is averaged,  the Siliwangi University SIMAK application is at level 2 or repeatable.


Author(s):  
Navin Jambhekar ◽  
Chitra Anil Dhawale

Information security is a prime goal for every individual and organization. The travelling from client to cloud server can be prone to security issues. The big data storages are available through cloud computing system to facilitate mobile client. The information security can be provided to mobile client and cloud technology with the help of integrated parallel and distributed encryption and decryption mechanism. The traditional technologies include the plaintext stored across cloud and can be prone to security issues. The solution provided by applying the encrypted data upload and encrypted search. The clouds can work in collaboration; therefore, the encryption can also be done in collaboration. Some part of encryption handle by client and other part handled by cloud system. This chapter presents the security scenario of different security algorithms and the concept of mobile and cloud computing. This chapter precisely defines the security features of existing cloud and big data system and provides the new framework that helps to improve the data security over cloud computing and big data security system.


Author(s):  
Nasim Talebi ◽  
Emmanuel Ayaburi ◽  
Suhail Chakravarty

Driven by the difficulty in achieving complete security with technical tools, business investigators are looking into organizational and behavioral issues that could help make systems more secure. This chapter looks at the security of systems from the organizational perspective. Specifically, this study attempts to identify if different organizations have different predisposition to particular type(s) of security threat sources. Using publicly available security breach data from a privacy rights clearinghouse to investigate which organizational characteristics predisposes an institution to an external or internal threat source, it was concluded that as size of organization and the number of its valuable documents increase by one unit, the organization's probability of suffering an internal attacks decrease. Furthermore, when executive members have a business degree rather than information-security-related degrees, the likelihood of suffering an internal attack increases. Also, the probability of an organization suffering an internal or external attack is not based on its industry type.


2015 ◽  
Vol 734 ◽  
pp. 194-197
Author(s):  
You De Ruan

This paper describes the construction of remote online access to PLC Laboratory based on Internet .The Laboratory apply industrial communication modules, relay on the powerful ommunications capabilities of Siemens PLC , transfer data by the Internet. The PLC of the Laboratory can be accessed by remote PC. The remote PC possible upload and download PLC program, online diagnosis, online monitoring, etc; and directly observed action of PLC by video, determine equipment movement is whether correct or error. The paper introduces the network topology, various functions and data security communication method of the system.


Author(s):  
Е.А. Исаев ◽  
E.A. Isaev

The rapid development of information technology in today's society dictates new requirements for information security technologies of data, methods of remote access and data processing, integrated reduction of financial expenses on working with information. In recent years, the ideal solution to all these problems that is widely suggested is the concept of cloud computing. This technique really makes a number of clear advantages when working with information and is already widely used in a number of areas of scientific and business activities, but many aspects of information security, characteristic of cloud computing is still far from a satisfactory solution. The article discusses the main challenges of information security of cloud computing. A review of methods to ensure data security, the choice of the most secure cloud computing is discussed, and models to provide the method of increasing the security of cloud computing are looked at.


2021 ◽  
Vol 15 (2) ◽  
pp. 65-75
Author(s):  
Maulyanda Az ◽  
Syafrial Fachri Pane ◽  
Rolly Maulana Awangga

Abstrak Penelitian ini membantu dalam melalukan proses Keamanan data atau informasi untuk menjamin kerahasiaan dan keaslian data atau informasi. Dalam perancangan ini menggunakan Kriptografi sebagai salah satu solusi dalam mengamankan data atau informasi. Metode kriptografi digunakan untuk mempersatukan algoritma Md5, Base64 serta AES (Advanced Encryption Standard). Kombinasi dari tiga algoritma menghasilkan ciphertext, yang dapat mengamankan data dari proses tag NFC. Penelitian ini menggunakan metodologi penelitian yang dapat menyatakan bahwa sistem yang dibangun dapat berfungsi dengan baik dan untuk keamanan nya aman digunakan, dari hasil penerapannya didapatkan hasil persentase keberhasilan 100%. Jadi, penelitian ini mampu menjawab permasalahan yang terjadi pada sistem keamanan data. Abstract This research helps in carrying out data or information security to ensure the confidentiality and authenticity of data or information. This design uses Cryptography as a solution in securing data or information. Cryptographic methods to unify the Md5, Base64, and AES (Advanced Encryption Standard) algorithms. The combination of the three algorithms produces ciphertext, which can secure data from the NFC tag process. This study uses a research methodology that can state that the system built can function correctly, and for security, it is safe to use because it has a 100% success percentage. So, this researchable to answer the problems that occur in the data security system.


2021 ◽  
Vol 8 (1) ◽  
pp. 17-xx
Author(s):  
Md. Mostafijur Rahman ◽  
Mani Manavalan ◽  
Taposh Kumar Neogy

The occurrence of various devices that are interlinked to provide advanced connectivity throughout the systems revolves around the formation of 5G systems. Artificial Intelligence plays a fundamental role in the 5G networks. The popularity and integration of 5G have emerged through advanced cellular networks and many other technologies. This innovative and speedy network has built strong connections in recent years, its conduct in business, personal work, or daily life. Artificial Intelligence and edge computing devices have optimized internet usages in everyday life. The growth of 5G networks is effective in the AI/ML algorithms due to its low latency and high bandwidth, which also performs real-time analysis, reasoning, and optimization. The 5G era has fundamental features that are highlighted among the revolutionary techniques which are most commonly used by cellular device networks, such as the resource management of radio, mobility management, and service management, and so on. This work also integrates the selection of spectrum and access the spectrum which AI-based interface to accomplish demands of 5G. The strategies which are introduced are Fractional Knapsack Greedy-based strategy and Language Hyperplane approach which becomes the basis of subsequently utilized by strategies of Artificial Intelligence for purpose of the selection of spectrum and the right allocation of spectrum for IoT-enabled sensor networks.  


Author(s):  
Pratiksha Satapure

Abstract: Data is any type of stored digital information. Security is about the protection of assets. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, personal databases and websites. Cryptography is evergreen and developments. Cryptography protects users by providing functionality for the encryption of data and authentication of other users. Compression is the process of reducing the number of bits or bytes needed to represent a given set of data. It allows saving more data. Cryptography is a popular ways of sending vital information in a secret way. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. The scenario of present day of information security system includes confidentiality, authenticity, integrity, nonrepudiation. The security of communication is a crucial issue on World Wide Web. It is about confidentiality, integrity, authentication during access or editing of confidential internal documents. Keywords: Cryptography, Hill Cipher, Homophonic Substitution Cipher, Monoalphabetic Cipher, Ceaser Cipher.


Author(s):  
D. Lakshmi Renuka devi

Abstract: In cloud computing distributed assets are shared by means of system in exchange of matter with its environment. Subsequently client can expanse the access their information from anyplace. Simultaneously exist protection and security problems arise because of various causes. Initial one is poignant upgrade in system advances. Another is expanded interestfor future benefit accretion, which make numerous associations to re- appropriate their information hoard. So there is a demand for assured cloud stockpiling management in open cloud condition where the supplier isn't a divulge in one. Our research tends to various data security and protectionassurance problems in a cloud computing condition and suggests a approach for giving assorted security administrations like authentication, consent and classification alongside checking in adjournment 128 piece Advanced Cryptograph Standard (ACS) is utilized to increment information security and classification. Incloud, aided technical information is encoded & decoded engrossing ACS and eventual transmit on a cloud. The supported model uses Short Message Service (SMS) mechanism by keeping away from unapproved access to client information. Keywords: Network, Authorization, Confidentiality, Security, authorized searchable cryptograph


2021 ◽  
Vol 102 (2) ◽  
pp. 40-49
Author(s):  
Elena Zinovieva ◽  
◽  
Valeriya Bulva ◽  

Today ensuring data security is becoming one of the priority areas of EU policy. In February 2020, the EU adopted the Data Strategy aiming at strengthening its leadership in a digital society. Although the strategy sets primarily economic goals, the problem of ensuring digital sovereignty occupies an important place. The purpose of this study is to examine the EU information security policy, starting from the concept of "Westphalian sovereignty" proposed by the S. Krasner. This concept found coverage in the works of M.M. Lebedeva. S. Krasner defines "Westphalian sovereignty" as the completeness of state power within the borders and the absence of other subjects of power. Analysis of the EU strategy in the field of information security and big data allows us to conclude that the EU emphasizes the need to limit the “Westphalian sovereignty” within the framework of an integration structure, and not individual member states. This contributes to understanding of the trends of evolution of state sovereignty in the context of globalization and the modern data revolution.


Sign in / Sign up

Export Citation Format

Share Document