Welcome to Information Security and Computer Fraud

Information Security and Computer Fraud is a peer-reviewed, open access journal that provides rapid publication of articles in all areas of information security and computer fraud. The goal of this journal is to provide a platform for scientists and academicians all over the world to promote, share, and discuss various new issues and developments in different areas of information security and computer fraud.

ISSN (Print): 2376-9602

ISSN (Online): 2376-9629

Editor-in-Chief: Sergii Kavun

Website: http://www.sciepub.com/journal/ISCF

   

Article

Linear Mix-net and a Scheme for Collecting Data from Anonymous Data Holders

1School of Engineering, University of Fukui, Fukui, Japan


Information Security and Computer Fraud. 2014, 2(3), 39-47
doi: 10.12691/iscf-2-3-2
Copyright © 2014 Science and Education Publishing

Cite this paper:
Shinsuke Tamura, Shuji Taniguchi. Linear Mix-net and a Scheme for Collecting Data from Anonymous Data Holders. Information Security and Computer Fraud. 2014; 2(3):39-47. doi: 10.12691/iscf-2-3-2.

Correspondence to: Shinsuke  Tamura, School of Engineering, University of Fukui, Fukui, Japan. Email: tamura@dance.plala.or.jp

Abstract

To make e-society, e-governance and cloud computing systems be utilized more widely, this paper proposes a scheme to collect attribute values belong to same data holders and calculate functions of them without knowing correspondences between the attribute values and their holders or links among attribute values of same holders. Different from most of other schemes the proposed scheme is based on linear Mix-net that exploits secret key encryption functions such as linear equation based (LE-based) and multidimensional array based (MA-based) ones, therefore it can handle real numbers that appear in many important business and engineering applications efficiently in the same way as integers. In addition, anonymous tag based credentials used in the scheme ensure the correctness of calculation results. Although the scheme can calculate only linear combinations of attribute values when LE-based encryption functions are used, if they are replaced with MA-based ones, it can calculate also general polynomial functions of attribute values.

Keywords

References

[1]  Diffie, W. and Hellman, M. E., “New directions in cryptography,” IEEE Trans. On Information Theory, IT-22 (6). 644-654. 1976.
 
[2]  Chaum, D., “Untraceable electronic mail, return address and digital pseudonyms,” Communications of the ACM, 24 (2). 84-88. 1981.
 
[3]  Cormen, T., Leiserson, C., Rivest, R. and Stein, C., Introduction to algorithms, MIT Press and McGraw-Hill, 2001.
 
[4]  Lee, B., Boyd, C., Dawson, E., Kim, K., Yang, J., and Yoo, S., “Providing receipt-freeness in Mixnet-based voting protocols,” Proc. of the ICISC ’03, 261-274. 2003.
 
[5]  Golle, P. and Jakobsson, M., “Reusable anonymous return channels,” Proc. of the 2003 ACM Workshop on Privacy in the Electronic Society, 94-100. 2003.
 
Show More References
[6]  Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A. and Shacham, H., “Randomizable proofs and delegatable anonymous credentials,” Proc. of the 29th Annual International Cryptology Conference on Advances in Cryptology, 108-125. 2009.
 
[7]  Shahandashti, S. F. and Safavi-Naini, R., “Threshold attribute-based signatures and their application to anonymous credential systems,” Proc. of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology, 198-216. 2009.
 
[8]  Gentry, C., “Fully homomorphic encryption using ideal lattices,” Proc. of Symposium on theory of computing –STOC 2009, 169-178. 2009.
 
[9]  Chung, K., Kalai, Y. and Vadhan, S., “Improved Delegation of Computation Using Fully Homomorphic Encryption,” CRYPT 2010, LNCS 6223, 483-501. 2010.
 
[10]  Tamura, S., Anonymous Security Systems and Applications: Requirements and Solutions, Information Science Reference, 2012.
 
[11]  Tamura, S. and Taniguchi, S., “A scheme for collecting anonymous data,” Proc. of IEEE-ICIT2013, 1210-1215. 2013.
 
[12]  Tamura, S. and Taniguchi, S., “Enhanced Anonymous Tag Based Credentials,” Information Security and Computer Fraud, 2 (1). 10-20. 2014.
 
Show Less References

Article

The Security File System in Smart TV Operating System

1School of Electronic Information Engineering, Tianjin University, Tianjin, China

2Tianjin Broadcast and Television Network Co., Ltd


Information Security and Computer Fraud. 2014, 2(3), 48-51
doi: 10.12691/iscf-2-3-3
Copyright © 2014 Science and Education Publishing

Cite this paper:
Wang Xin, Yao Suying. The Security File System in Smart TV Operating System. Information Security and Computer Fraud. 2014; 2(3):48-51. doi: 10.12691/iscf-2-3-3.

Correspondence to: Wang  Xin, School of Electronic Information Engineering, Tianjin University, Tianjin, China. Email: pyhiloveyou@126.com

Abstract

Modern smart TV devices have put a wealth of information and ever increasing opportunities for social interaction at the fingertips of users. At the center of this revolution are smart phone, smart TV and tablet computers, which give people a nearly constant connection to the Internet. As smart TV usage increases, more developers become involved in implementing application for smart TV. Security for application running on the smart TV is important. The smart TV operating system provides great flexibility not only for application developers but also for users. Most of Smart TV Operating Systems are open source operating system designed for Digital TV available on a variety of smart TV devices. As with PCs, there are a variety of security threats that can affect the smart TV device such as application based threat, web based threat, network based threat and file data threat. In this paper, we mainly focus on file data threat, in order to keep the data integrity the information should not be amended, damaged and loss in transmission process. We present the security file system in the Smart TV Operating System.

Keywords

References

[1]  Wang Xin, Chen Delin, Sun Yue, Wang Xu, Yao Suying, “Security control for TVOS”, 2014 2nd Asian Pacific Conference on Mechatronics and Control Engineering.
 
[2]  Wang Xin, Yao Suying, Wang Xu, Chen Delin, Sun Jun, Hua Zhong, Wang Dongfei, “TVOS Content Security Analysis and Protection in Smart TV”, 2014 2nd International Conference on Mechatronics and Control Engineering.
 
[3]  Wang Xin, Chen Delin, Sun Yue, Wang Xu, Yao Suying, “The Security Model of Broadcast Illtelligent Terminal Application and Technology Realization on TVOS”, 2014 2nd International Conference on Mechatronics and Control Engineering.
 
[4]  Felix Rohrer, Nebiyu Feleke, Yuting Zhang, Kenneth Nimley,Lou Chitkushev, Tanya Zlateva1. Android Security Analysis and Protectionin Finance and Healthcare. //Boston University MET
 
[5]  ChenDelin, Li Zheng, Wang Ying, Zhao Liangfu, Zhang Dingjing. “The main technical characteristics and software architecture of NGB TVOS”, “Radio and television information”, 2013-10National Academy of Broadcasting Science
 
Show More References
[6]  NGB TVOS1.0 Version of cooperation and development. The next generation of radio and television (NGB) Intelligent Technology TV operating system v1.0.0, the State Press and Publication Administration
 
[7]  GY/T267-2012.NGB Technical specification of terminal middleware, the State Press and Publication Administration
 
[8]  Wang Mingmin, Zhu Yunbin. “To explore the implementation model and techniques of intelligent television terminal security under NGB environment”, “Radio and TV Technology”, 2012-10.
 
[9]  Ning Hua, Li Wei, Wang Kun, Lei Mingyu. “Research on intelligent terminal security system”, “Modern telecommunication technology”, 2012-5.
 
[10]  Haohui Mai, Edgar Pek, Hui Xue, Samuel T. King, P.Madhusudan. Verifying Security Invariants in ExpressOS // University of Illinois at Urbana-Champaign
 
[11]  Bernhard J. Berger, Michaela Bunke, and Karsten Sohr. An Android Security Case Study with Bauhaus // 2011 18th Working Conference on Reverse Engineering.
 
[12]  Zhiguo Wan, Jun’e Liu, Rui Zhang, and Robert H. Deng. “A Collusion-Resistant Conditional Access System for Flexible-Pay-Per-Channel Pay-TV Broadcasting” // IEEE TRANSACTIONS ON MULTIMEDIA VOL. 15,NO. 6, OCTOBER 2013
 
[13]  Eun-Jun Yoon, Kee-Young Yoo. “ECC-based Key Exchange Protocol for IPTV Service” // ICIC 2011
 
[14]  Stephen D. WolthusenFraunhofer-IGD. “Security Policy Enforcement at the File System Level in the Windows NT Operating System Family”.
 
[15]  Hung-Min Sun, Mu-En Wu, Wei-Chi Ting, and M. Jason Hinek. “Dual RSA and Its Security Analysis” //IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 8, AUGUST 2007.
 
Show Less References

Article

Comparative Analysis of Block Cipher-Based Encryption Algorithms: A Survey

1Computer Engineering Department, American University of the Middle East, Egaila, Kuwait


Information Security and Computer Fraud. 2015, 3(1), 1-7
doi: 10.12691/iscf-3-1-1
Copyright © 2015 Science and Education Publishing

Cite this paper:
Chadi RIMAN, Pierre E. ABI-CHAR. Comparative Analysis of Block Cipher-Based Encryption Algorithms: A Survey. Information Security and Computer Fraud. 2015; 3(1):1-7. doi: 10.12691/iscf-3-1-1.

Correspondence to: Pierre  E. ABI-CHAR, Computer Engineering Department, American University of the Middle East, Egaila, Kuwait. Email: chadi.riman@aum.edu.kw, Pierre.abichar@aum.edu.kw

Abstract

Nowadays, network security is increasing rapidly and becoming an important and challenging issue. Information and internet security threats and attacks are becoming difficult to be detected. Therefore, encryption has come up as a solution, and plays an important role in information security system. Many techniques are needed to protect the shared data. In this paper we implemented four encrypt techniques AES, DES, 3DES and E-DES algorithms and compared their performance. A comparative analysis on the above symmetric encryption algorithms has been made. These algorithms consume a significant amount of computing resources such as CPU time, memory and battery power. Experiments results are given to analyses the effectiveness of each algorithm. The comparison is made on the basis of these parameters: speed, block size, and key size etc. Educational-DES has better performance than other DES, 3DES, and AES algorithms.

Keywords

References

[1]  Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud, “Performance Evaluation of Symmetric Encryption Algorithms”, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, pp. 280-286, December 2008.
 
[2]  W. Stallings, Cryptography and Network Security, 4th Edition, Pearson Prentice Hall, 2006.
 
[3]  Singh S Preet, Mani Raman, “Comparison of Data Encryption Algorithms”, International Journal of Computer science and Communications, Vol. 2, No.1, January-June 2011, pp. 125-127.
 
[4]  Cornwell Jason W, “Blowfish Survey”, Department of Computer science, Columbus State university, Columbus, GA, 2010.
 
[5]  Tamimi A. Al., “Performance Analysis of Data Encryption Algorithms”, Oct 2008.
 
Show More References
[6]  Nadeem Aamer, “Performance Comparison of Data Encryption Algorithms”, Oct 2008.
 
[7]  Dhawan Priya, “Performance Comparison: Security Design Choices”, Microsoft Developer Network October 2002.
 
[8]  Singh Gurjeevan, Kumar Ashwani, Sandha K.S. “A Study of New Trends in Blowfish Algorithm” International Journal of Engineering Research and Applications (IJERA), Vol. 1, Issue 2, pp.321-326.
 
[9]  Agrawal Monika, Mishra Pradeep, “A Comparative Survey on Symmetric Key Encryption Techniques”, International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 05 May 2012, pp. 877-882.
 
[10]  Seth Shashi Mehrotra, Mishra Rajan, “Comparative analysis of Encryption algorithm for data communication”, International Journal of Computer Science and Technology, vol. 2, Issue 2, June 2011, pp. 292-294.
 
[11]  Mandal Pratap Chandra, “Superiority of Blowfish Algorithm” IJARCSSE, volume 2, Issue 9, September 2012, pp. 196-201.
 
[12]  Apoorva, Kumar Yogesh, “Comparative Study of Different Symmetric Key Cryptography”, IJAIEM, vol. 2, Issue 7, July 2013, pp. 204-206.
 
[13]  Abdul D.S, Kader H.M Abdul, Hadhoud, M.M., “Performance Evaluation of Symmetric Encryption Algorithms”, Communications of the IBIMA, Volume 8, 2009, pp. 58-64
 
[14]  Thakur Jawahar, Kumar Nagesh. “DES, AES and Blowfish Symmetric Key Cryptography algorithm Simulation Based Performance Analysis”, IJETAE, vol. 1, Issue 2, DEC. 2011, pp. 6-12.
 
[15]  Marwaha Mohit, Bedi Rajeev, Singh Amritpal, Singh Tejinder, “Comparative Analysis of Cryptographic Algorithms”, International Journal of Advanced Engineering Technology/IV/III/July-Sep, 2013/16-18.
 
[16]  Alam Md Imran, Khan Mohammad Rafeek. “Performance and Efficiency Analysis of Different Block Cipher Algorithms of Symmetric Key Cryptography”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 10, October 2013, pp.713-720.
 
[17]  Saini Bahar, “Survey On Performance Analysis of Various Cryptographic Algorithms”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 4, April 2014, pp. 1-4.
 
[18]  Hamdan.O.Alanazi, B.B.Zaidan, A.A.Zaidan, Hamid A.Jalab, M.Shabbir and Y. Al-Nabhani, “New Comparative Study Between DES, 3DES and AES within Nine Factors”, Journal Of Computing, Volume 2, ISSUE 3, pp. 152-157, March 2010.
 
[19]  Priyanka Arora, Arun Singh and Himanshu Tiyagi, “Evaluation and Comparison of Security Issues on Cloud Computing Environment”, World of Computer Science and Information Technology Journal (WCSIT), Vol. 2, No. 5, pp. 179-183, 2012.
 
[20]  W. Tuchman, A Brief History of the Data Encryption Standard, Internet besieged: countering cyberspace scofflaws. ACM Press/Addison-Wesley Publishing Co. New York, NY, USA, 1998, pp. 275-280.
 
[21]  http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_4-2/goodbye_des.html.
 
[22]  http://www.differencebetween.net/technology/difference-between-des-and-aes/.
 
[23]  C. Riman and H. Hallal. “DES Based Educational Data Encryption System”, International Conference on Security and Management SAM 2013 (WORLDCOMP’13), Las Vegas, USA, July 2013.
 
Show Less References