Volume 4 Number 2 December 2017

    
A Lightweight JSON-based Access Control Policy Evaluation Framework

Hao Jiang, Ahmed Bouabdallah

https://doi.org/

Abstract Along with the rapid development of ICT technologies, new areas like Industry 4.0, IoT and 5G have emerged and brought out the need for protecting shared resources and services under time-critical and energy-constrained scenarios with real-time policy-based access control. The process of policy evaluation under these circumstances must be executed within an unobservable delay and strictly comply with security objectives. To achieve this,... Read More


An Active Steganographic Scheme Using SSB

Sarathkumar. R, Kalpana. V

https://doi.org/

Abstract Steganography is the art of hiding the reality that communication is carried out, by concealing data in other data. The Steganographic techniques increse the security by exploring the possibility of data analytics to hide data efficiently and securely. The proposed active steganographic method examines each pixel in an image and categories the pixel into primary and secondary pixels and based on that it... Read More


Intruder Notification System & Security in Cloud Computing: A Review

Shweta Jaiswal, Manish Ahirwar, Raju Baraskar

https://doi.org/

Abstract Large-scale deployment & use of cloud computing in the industry is accompanied & in same time hampered by concerns regarding protection of data handled by cloud computing providers. One of the consequences of moving data processing & storage of company premises is that organizations have less control over their infrastructure. As a result, cloud service (CS) clients must trust that CS provider... Read More