Timely behavior of modern information security and protection is the defining characteristic of real time systems when faced with deadlines by which control responses must be produced or catastrophic failures may occur. In this chapter we present an algorithm to obtain end-to-end security for real-time communication systems, particularly in IP telephony. This chapter presents an asymmetric streaming cipher to encrypt real-time data units produced by an analogue-to-digital device. The robustness of the introduced one-way trapdoor function is grounded on the complexity of inverting highly non-linear Boolean permutations designed over non-commutative and non-associative algebraic structures. Moreover, the efficiency of the proposed method is achieved by providing real-time computation, and by eliminating the preliminary latent generation of embedded components and session keys.
This research presents a link between Boolean and modern algebra. The computational complexity of generating highly nonlinear balanced Boolean functions for designing efficient ciphers is shown. Generalized identities shaped as quasigroups are then analyzed to introduce an efficient mathematical apparatus for generating highly nonlinear Boolean functions over quasigroups.
A desktop application providing steganographic data hiding is proposed. The steganographic key secure exchange is realized through the Diffie-Hellman key exchange protocol, and Portable Document Format files are used as data containers taking into account their widespread use on the Internet. A permutation cipher for providing original data security has also been applied.
A new method is developed for securing data exchange processes. A compute module is used to secure data transferred from different devices to the cloud environment. Encryption is done through a symmetric algorithm, which is adapted to the compute module in order to provide a high level of speed and security. A corresponding software solution for managing the encryption and decryption process is also described.
In this paper, we describe a new protocol for secure evaluation of Deterministic Finite Automata (DFA) between two parities (client and server). The protocol has no restrictions on the DFA's input alphabet and runs in a single client-server communication round. It uses O(mn) operations for client-side computations, O(mn|Q|) operations for server-side computations, and the network communication bandwidth is O(mnk|Q|) bytes where k is the security parameter of the protocol, m is the size of the DFA's input alphabet, n is the length of the input text and |Q| is the number of the DFA states. As a building block our algorithm uses the white-box based 1-out-of-n oblivious transfer protocol, which results that the protocol does no public-key operations. Apart from the description of the protocol, the paper also contains results of efficiency benchmarks done on our implementation of the protocol.
A new method was developed for secure storage of data in cloud systems. Data is distributed across different areas of cloud storage. The distribution is performed through a threshold scheme based on error-correcting codes for faster calculations, which provides a high level of data security, integrity and availability.
E-health aims to use information and communication technologies to improve the health of citizens, the productivity and efficiency of healthcare delivery, and the social and economic value of health. It encompasses the various interoperability approaches and mechanisms of health services, products and processes, combined with organizational changes in healthcare systems, with regard to interactions between patients and health-service providers, institution-to-institution data-transmission, or peer-to-peer communication between patients and/or health professionals. Since the inappropriate use or misuse of medical information can lead to undesirable outcomes, medicine and health are considered to be very sensitive areas of human life and work. It is therefore important to implement security policies, practices and procedures, as well as cyber security and defense technologies, which help to protect e-health systems against attacks, to detect abnormal activities, and to establish proven contingency plans. This work presents a framework for the security assessment of national e-health systems, which considers country-level practices and perspectives on cyber defense, information security and data protection in e-health in a holistic manner. The framework covers assessment criteria: from national security and critical infrastructures to personal data protection and user and information privacy, and various cyber security aspects in government-to-government, government-to-citizen and government-to-business categories of the e-government ecosystem. Security assessment criteria are grouped and analyzed through four interoperability aspects: legal, technical, semantic and organizational. The security assessment framework was validated and established on the Croatian e-health system, and its advantages and limitations are identified.
Environmental studies contribute to increasing understanding of complex and system-oriented phenomena. The State-of-the-art in e-infrastructures are an inventive and exceptional way to efficiently share and access different types of resources, which can effectively enhance the potential of scientific research and productivity. The aim of the paper is to introduce a developed e-Infrastructure and its security components for environmental research.
The criticality level of the civil aviation information infrastructure is considerably amplified by the high degree of connectivity and interaction between ground and aircraft systems. Malicious interference with mentioned systems puts passengers, crew and ground staff security at threat. Unauthorized access to so-called critical aviation information system may have serious and tragic consequences (hundreds of passengers' lives, significant financial losses, etc.). In this context, the security of critical aviation information systems must be ensured in accordance with international control aviation security documents.
This article investigates the problem of updating the education system for the digital generation (Generation Z) based on the latest information security methods and practices. The generations timeline is presented. Aims and objectives of security education are revealed. Basic ideas of security and privacy are considered for using social networks in education. It is concluded that information security will continue to be a central concern for all sectors, most notably in the education sector.
Speaking about security education seems to be useless. Practically every information technology university teacher is ready to claim that students are adequately prepared in the area of security. But considering security education in terms of data analysis shows that the topic is much wider than at first expected. It spans not only different areas of technologies and data analysis, but covers unexpected areas such as psychology or sociology. In this sense, we have to educate security specialists in an interdisciplinary manner, and be ready to work in teams with members trained in different areas.
Today, nearly all companies have adopted cloud technologies. Both public and private clouds have a number of advantages and disadvantages in terms of security, scalability and reliability. The choice of a cloud provider depends on the organization's particular requirements, which entails a comparative analysis of various cloud providers based on the needs of IT infrastructure. This chapter presents the results of the evaluation of cloud technology for social and governmental agencies. Recommendations for assessing quality of service are also given.