查看更多>>摘要:In the environment of big data, the traditional access control lacks effective and flexible access mechanism. Based on attribute access control, this paper proposes a HBMC-ABAC big data access control framework. It solves the problems of difficult authority change, complex management, over-authorization and lack of authorization in big data environment. At the same time, binary mapping codes are proposed to solve the problem of low efficiency of policy retrieval in traditional ABAC. Through experimental analysis, the results show that our proposed HBMC-ABAC model can meet the current large and complex environment of big data.
查看更多>>摘要:Technology is expanding like a mushroom, there are various benefits of technology, in contrary users are facing serious losses by this technology. Furthermore, people lost their lives, their loved ones, brain-related diseases, etc. The industry is eager to get one technology that can secure their finance-related matters, personal videos or pictures, precious contact numbers, and their current location. Things are going worst because every software has some sort of legacy, deficiency, and shortcomings through which exploiters gain access to any software. There are various ways to get illegitimate access but on the top is Linux Kali with QRLjacker by user grabber command. This study recapitulates the impacts of the said technology and related avoidance. Detail contemplation depicts social media users like WhatsApp users can take a long sigh of relief when they will adopt the recommended methods. The problem is breaching of legitimate social media real-time location by an illegitimate user through Linux Kali, for this reason, end-user has no knowledge to spoof their IP to protect their real-time location. This paper will address the solution to the said problem.
查看更多>>摘要:Along with the increase of wearable medical device, the privacy leakage problem in the process of transmission between these edge medical devices. The blockchain-enabled Internet of Medical Things (BIoMT) has been developed to reform traditional centralized medical system in recent years. This paper first introduces a data anonymous authentication model to protect user privacy and medical data in BIoMT. Then, a proxy group signature (PGS) scheme has been proposed based on lattice assumption. This scheme can well satisfy the anonymous authentication demand for the proposed model, and provide anti-quantum attack security for BIoMT in the future general quantum computer age. Moreover, the security analysis shows this PGS scheme is secure against the dynamical-almost-full anonymous and traceability. The efficiency comparison shows the proposed model and PGS scheme is more efficient and practical.
查看更多>>摘要:QR codes are applied widely on the Internet and mobile devices in recent years. Its open standards and the characteristics of easy to generate lead to anyone can generate their QR code easily. Also, the QR code does not have the ability of hiding information, which leads to everyone can get access to read the content in any QR code, including those hiding some secret content in the bytes of QR code. Therefore, in recent years, information tampering and information leakage cases caused by poor security of two-dimensional code occur frequently, especially in the financial field and multi-party verification scenarios. QR codes are almost impossible to use in these scenarios. Therefore, this paper proposes a distributed information sharing method based on information hiding QR code. This method can make secret code in QR code safer and robust, and the secret shared between receivers can be used for decryption and attacking detection. Therefore, on the one hand, the information hiding method can maximize the capacity of embedded secret information, on the other hand, it can prevent attacks by disguised attackers and recover hidden secret information through reconstruction. This paper illustrates the feasibility of this scheme through the form of theoretical proof.