Hash Digest

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 144 Experts worldwide ranked by ideXlab platform

Jae-woo Chang - One of the best experts on this subject based on the ideXlab platform.

  • MUE/FutureTech - A Density-Aware Data Encryption Scheme with Query Auditing Index for Secure Mobile Services
    Lecture Notes in Electrical Engineering, 2017
    Co-Authors: Moon-hwan Kang, Min Yoon, Jae-woo Chang
    Abstract:

    In database outsourcing, because a service provider might be untrusted or compromised, two issues of data security emerge: data confidentiality and data integrity. Motivated by these issues, we propose a density-aware data encryption scheme and a query processing algorithm with query result auditing for secure mobile services. To guarantee the data confidentiality, our density-aware data encryption scheme utilizes a grid index to transform the original data space into a bitmap signature. In addition, to reduce the transmission overhead of verification data, we propose a query result authentication index that stores an encrypted signature for each anchor, which is the concatenated Hash Digest of clustered data. Through performance evaluation, we show that the proposed scheme guarantees the high level of privacy preservation to users while providing better query processing performance, compared with the state-of-the-art schemes.

  • A New Query Integrity Verification Method with Cluster-based Data Transformation in Cloud Computing Environment
    International Journal of Smart Home, 2015
    Co-Authors: Miyoung Jang, Min Yoon, Jae-woo Chang
    Abstract:

    Due to advancement in cloud computing technology, the research on the outsourced database has been spotlighted. In database outsourcing, because the service provider might be untrusted or compromised, two issues of data security emerge: data confidentiality and data integrity. Many data transformation schemes were widely studied for preserving data confidentiality, but they are vulnerable to data leakage problem because they do not consider data distribution when encrypting original data. Meanwhile, several query authentication schemes were proposed to verity data integrity, but they suffer from transmission overhead of verification data. Motivated by these problems, we propose a privacy-aware query authentication scheme which guarantees the data confidentiality and the query result integrity of sensitive data. To solve the original data leakage problem, our clustering-based data transformation scheme is designed to select anchors based on data distribution. To verify the query result, we propose a query result authentication index that stores an encrypted signature for each anchor, which is a concatenated Hash Digest of cluster data. A user compares the verification information with the cluster signatures stored in the verification index. Through performance evaluation, we show that our method outperforms the existing method in terms of query processing time and verification data size.

  • a signature based data authentication method with bitmap based transformed datain database outsourcing
    Procedia Computer Science, 2015
    Co-Authors: Miyoung Jang, Min Yoon, Youngho Song, Jae-woo Chang
    Abstract:

    Abstract Due to the advancement in cloud computing technology, the research on database outsourcing has been actively done. In database outsourcing, because a service provider might be untrusted or compromised, two issues of data security emerge: data confidentiality and data integrity. Many data transformation schemes were widely studied for preserving data confidentiality, but they are vulnerable to data leakage problem because they do not consider data distribution when encrypting original data. Meanwhile, several query authentication schemes were proposed to verity data integrity, but they suffer from transmission overhead of verification data. In this paper, we propose a privacy-aware data transformation and a query authentication scheme which guarantees the data confidentiality and the query result integrity of sensitive data. To solve the original data leakage problem, we propose a bitmap-based data transformation scheme with anchor selection based on data distribution. We also devise an algebraic coding-based Hash index that transforms a query to a bitmap and retrieves the anchor information efficiently. To reduce the transmission overhead of verification data, we propose a query result authentication index that stores an encrypted signature for each anchor, which is an concatenated Hash Digest of cluster data. Through performance evaluation, we show that our scheme outperforms the existing method up to 15 times, in terms of query processing time and verification overhead.

  • ANT/SEIT - A Signature-based Data Authentication Method with Bitmap-based Transformed Datain Database Outsourcing
    Procedia Computer Science, 2015
    Co-Authors: Miyoung Jang, Min Yoon, Youngho Song, Jae-woo Chang
    Abstract:

    Abstract Due to the advancement in cloud computing technology, the research on database outsourcing has been actively done. In database outsourcing, because a service provider might be untrusted or compromised, two issues of data security emerge: data confidentiality and data integrity. Many data transformation schemes were widely studied for preserving data confidentiality, but they are vulnerable to data leakage problem because they do not consider data distribution when encrypting original data. Meanwhile, several query authentication schemes were proposed to verity data integrity, but they suffer from transmission overhead of verification data. In this paper, we propose a privacy-aware data transformation and a query authentication scheme which guarantees the data confidentiality and the query result integrity of sensitive data. To solve the original data leakage problem, we propose a bitmap-based data transformation scheme with anchor selection based on data distribution. We also devise an algebraic coding-based Hash index that transforms a query to a bitmap and retrieves the anchor information efficiently. To reduce the transmission overhead of verification data, we propose a query result authentication index that stores an encrypted signature for each anchor, which is an concatenated Hash Digest of cluster data. Through performance evaluation, we show that our scheme outperforms the existing method up to 15 times, in terms of query processing time and verification overhead.

Tulsi Swami - One of the best experts on this subject based on the ideXlab platform.

  • Primary User Authentication in Cognitive Radio Network Using pre-generated Hash Digest
    2018 International Conference on Advances in Computing Communications and Informatics (ICACCI), 2018
    Co-Authors: Muzzammil Hussain, Tulsi Swami
    Abstract:

    The primary objective of Cognitive Radio Networks (CRN) is to opportunistically utilize the available spectrum for efficient and seamless communication. Like all other radio networks, Cognitive Radio Network also suffers from a number of security attacks and Primary User Emulation Attack (PUEA) is vital among them. Primary user Emulation Attack not only degrades the performance of the Cognitive Radio Networks but also dissolve the objective of Cognitive Radio Network. Efficient and secure authentication of Primary Users (PU) is an only solution to mitigate Primary User Emulation Attack but most of the mechanisms designed for this are either complex or make changes to the spectrum. Here, we proposed a mechanism to authenticate Primary Users in Cognitive Radio Network which is neither complex nor make any changes to spectrum. The proposed mechanism is secure and also has improved the performance of the Cognitive Radio Network substantially.

  • ICACCI - Primary User Authentication in Cognitive Radio Network Using pre-generated Hash Digest
    2018 International Conference on Advances in Computing Communications and Informatics (ICACCI), 2018
    Co-Authors: Muzzammil Hussain, Tulsi Swami
    Abstract:

    The primary objective of Cognitive Radio Networks (CRN) is to opportunistically utilize the available spectrum for efficient and seamless communication. Like all other radio networks, Cognitive Radio Network also suffers from a number of security attacks and Primary User Emulation Attack (PUEA) is vital among them. Primary user Emulation Attack not only degrades the performance of the Cognitive Radio Networks but also dissolve the objective of Cognitive Radio Network. Efficient and secure authentication of Primary Users (PU) is an only solution to mitigate Primary User Emulation Attack but most of the mechanisms designed for this are either complex or make changes to the spectrum. Here, we proposed a mechanism to authenticate Primary Users in Cognitive Radio Network which is neither complex nor make any changes to spectrum. The proposed mechanism is secure and also has improved the performance of the Cognitive Radio Network substantially.

Muzzammil Hussain - One of the best experts on this subject based on the ideXlab platform.

  • Primary User Authentication in Cognitive Radio Network Using pre-generated Hash Digest
    2018 International Conference on Advances in Computing Communications and Informatics (ICACCI), 2018
    Co-Authors: Muzzammil Hussain, Tulsi Swami
    Abstract:

    The primary objective of Cognitive Radio Networks (CRN) is to opportunistically utilize the available spectrum for efficient and seamless communication. Like all other radio networks, Cognitive Radio Network also suffers from a number of security attacks and Primary User Emulation Attack (PUEA) is vital among them. Primary user Emulation Attack not only degrades the performance of the Cognitive Radio Networks but also dissolve the objective of Cognitive Radio Network. Efficient and secure authentication of Primary Users (PU) is an only solution to mitigate Primary User Emulation Attack but most of the mechanisms designed for this are either complex or make changes to the spectrum. Here, we proposed a mechanism to authenticate Primary Users in Cognitive Radio Network which is neither complex nor make any changes to spectrum. The proposed mechanism is secure and also has improved the performance of the Cognitive Radio Network substantially.

  • ICACCI - Primary User Authentication in Cognitive Radio Network Using pre-generated Hash Digest
    2018 International Conference on Advances in Computing Communications and Informatics (ICACCI), 2018
    Co-Authors: Muzzammil Hussain, Tulsi Swami
    Abstract:

    The primary objective of Cognitive Radio Networks (CRN) is to opportunistically utilize the available spectrum for efficient and seamless communication. Like all other radio networks, Cognitive Radio Network also suffers from a number of security attacks and Primary User Emulation Attack (PUEA) is vital among them. Primary user Emulation Attack not only degrades the performance of the Cognitive Radio Networks but also dissolve the objective of Cognitive Radio Network. Efficient and secure authentication of Primary Users (PU) is an only solution to mitigate Primary User Emulation Attack but most of the mechanisms designed for this are either complex or make changes to the spectrum. Here, we proposed a mechanism to authenticate Primary Users in Cognitive Radio Network which is neither complex nor make any changes to spectrum. The proposed mechanism is secure and also has improved the performance of the Cognitive Radio Network substantially.

Miyoung Jang - One of the best experts on this subject based on the ideXlab platform.

  • A New Query Integrity Verification Method with Cluster-based Data Transformation in Cloud Computing Environment
    International Journal of Smart Home, 2015
    Co-Authors: Miyoung Jang, Min Yoon, Jae-woo Chang
    Abstract:

    Due to advancement in cloud computing technology, the research on the outsourced database has been spotlighted. In database outsourcing, because the service provider might be untrusted or compromised, two issues of data security emerge: data confidentiality and data integrity. Many data transformation schemes were widely studied for preserving data confidentiality, but they are vulnerable to data leakage problem because they do not consider data distribution when encrypting original data. Meanwhile, several query authentication schemes were proposed to verity data integrity, but they suffer from transmission overhead of verification data. Motivated by these problems, we propose a privacy-aware query authentication scheme which guarantees the data confidentiality and the query result integrity of sensitive data. To solve the original data leakage problem, our clustering-based data transformation scheme is designed to select anchors based on data distribution. To verify the query result, we propose a query result authentication index that stores an encrypted signature for each anchor, which is a concatenated Hash Digest of cluster data. A user compares the verification information with the cluster signatures stored in the verification index. Through performance evaluation, we show that our method outperforms the existing method in terms of query processing time and verification data size.

  • a signature based data authentication method with bitmap based transformed datain database outsourcing
    Procedia Computer Science, 2015
    Co-Authors: Miyoung Jang, Min Yoon, Youngho Song, Jae-woo Chang
    Abstract:

    Abstract Due to the advancement in cloud computing technology, the research on database outsourcing has been actively done. In database outsourcing, because a service provider might be untrusted or compromised, two issues of data security emerge: data confidentiality and data integrity. Many data transformation schemes were widely studied for preserving data confidentiality, but they are vulnerable to data leakage problem because they do not consider data distribution when encrypting original data. Meanwhile, several query authentication schemes were proposed to verity data integrity, but they suffer from transmission overhead of verification data. In this paper, we propose a privacy-aware data transformation and a query authentication scheme which guarantees the data confidentiality and the query result integrity of sensitive data. To solve the original data leakage problem, we propose a bitmap-based data transformation scheme with anchor selection based on data distribution. We also devise an algebraic coding-based Hash index that transforms a query to a bitmap and retrieves the anchor information efficiently. To reduce the transmission overhead of verification data, we propose a query result authentication index that stores an encrypted signature for each anchor, which is an concatenated Hash Digest of cluster data. Through performance evaluation, we show that our scheme outperforms the existing method up to 15 times, in terms of query processing time and verification overhead.

  • ANT/SEIT - A Signature-based Data Authentication Method with Bitmap-based Transformed Datain Database Outsourcing
    Procedia Computer Science, 2015
    Co-Authors: Miyoung Jang, Min Yoon, Youngho Song, Jae-woo Chang
    Abstract:

    Abstract Due to the advancement in cloud computing technology, the research on database outsourcing has been actively done. In database outsourcing, because a service provider might be untrusted or compromised, two issues of data security emerge: data confidentiality and data integrity. Many data transformation schemes were widely studied for preserving data confidentiality, but they are vulnerable to data leakage problem because they do not consider data distribution when encrypting original data. Meanwhile, several query authentication schemes were proposed to verity data integrity, but they suffer from transmission overhead of verification data. In this paper, we propose a privacy-aware data transformation and a query authentication scheme which guarantees the data confidentiality and the query result integrity of sensitive data. To solve the original data leakage problem, we propose a bitmap-based data transformation scheme with anchor selection based on data distribution. We also devise an algebraic coding-based Hash index that transforms a query to a bitmap and retrieves the anchor information efficiently. To reduce the transmission overhead of verification data, we propose a query result authentication index that stores an encrypted signature for each anchor, which is an concatenated Hash Digest of cluster data. Through performance evaluation, we show that our scheme outperforms the existing method up to 15 times, in terms of query processing time and verification overhead.

Min Yoon - One of the best experts on this subject based on the ideXlab platform.

  • MUE/FutureTech - A Density-Aware Data Encryption Scheme with Query Auditing Index for Secure Mobile Services
    Lecture Notes in Electrical Engineering, 2017
    Co-Authors: Moon-hwan Kang, Min Yoon, Jae-woo Chang
    Abstract:

    In database outsourcing, because a service provider might be untrusted or compromised, two issues of data security emerge: data confidentiality and data integrity. Motivated by these issues, we propose a density-aware data encryption scheme and a query processing algorithm with query result auditing for secure mobile services. To guarantee the data confidentiality, our density-aware data encryption scheme utilizes a grid index to transform the original data space into a bitmap signature. In addition, to reduce the transmission overhead of verification data, we propose a query result authentication index that stores an encrypted signature for each anchor, which is the concatenated Hash Digest of clustered data. Through performance evaluation, we show that the proposed scheme guarantees the high level of privacy preservation to users while providing better query processing performance, compared with the state-of-the-art schemes.

  • A New Query Integrity Verification Method with Cluster-based Data Transformation in Cloud Computing Environment
    International Journal of Smart Home, 2015
    Co-Authors: Miyoung Jang, Min Yoon, Jae-woo Chang
    Abstract:

    Due to advancement in cloud computing technology, the research on the outsourced database has been spotlighted. In database outsourcing, because the service provider might be untrusted or compromised, two issues of data security emerge: data confidentiality and data integrity. Many data transformation schemes were widely studied for preserving data confidentiality, but they are vulnerable to data leakage problem because they do not consider data distribution when encrypting original data. Meanwhile, several query authentication schemes were proposed to verity data integrity, but they suffer from transmission overhead of verification data. Motivated by these problems, we propose a privacy-aware query authentication scheme which guarantees the data confidentiality and the query result integrity of sensitive data. To solve the original data leakage problem, our clustering-based data transformation scheme is designed to select anchors based on data distribution. To verify the query result, we propose a query result authentication index that stores an encrypted signature for each anchor, which is a concatenated Hash Digest of cluster data. A user compares the verification information with the cluster signatures stored in the verification index. Through performance evaluation, we show that our method outperforms the existing method in terms of query processing time and verification data size.

  • a signature based data authentication method with bitmap based transformed datain database outsourcing
    Procedia Computer Science, 2015
    Co-Authors: Miyoung Jang, Min Yoon, Youngho Song, Jae-woo Chang
    Abstract:

    Abstract Due to the advancement in cloud computing technology, the research on database outsourcing has been actively done. In database outsourcing, because a service provider might be untrusted or compromised, two issues of data security emerge: data confidentiality and data integrity. Many data transformation schemes were widely studied for preserving data confidentiality, but they are vulnerable to data leakage problem because they do not consider data distribution when encrypting original data. Meanwhile, several query authentication schemes were proposed to verity data integrity, but they suffer from transmission overhead of verification data. In this paper, we propose a privacy-aware data transformation and a query authentication scheme which guarantees the data confidentiality and the query result integrity of sensitive data. To solve the original data leakage problem, we propose a bitmap-based data transformation scheme with anchor selection based on data distribution. We also devise an algebraic coding-based Hash index that transforms a query to a bitmap and retrieves the anchor information efficiently. To reduce the transmission overhead of verification data, we propose a query result authentication index that stores an encrypted signature for each anchor, which is an concatenated Hash Digest of cluster data. Through performance evaluation, we show that our scheme outperforms the existing method up to 15 times, in terms of query processing time and verification overhead.

  • ANT/SEIT - A Signature-based Data Authentication Method with Bitmap-based Transformed Datain Database Outsourcing
    Procedia Computer Science, 2015
    Co-Authors: Miyoung Jang, Min Yoon, Youngho Song, Jae-woo Chang
    Abstract:

    Abstract Due to the advancement in cloud computing technology, the research on database outsourcing has been actively done. In database outsourcing, because a service provider might be untrusted or compromised, two issues of data security emerge: data confidentiality and data integrity. Many data transformation schemes were widely studied for preserving data confidentiality, but they are vulnerable to data leakage problem because they do not consider data distribution when encrypting original data. Meanwhile, several query authentication schemes were proposed to verity data integrity, but they suffer from transmission overhead of verification data. In this paper, we propose a privacy-aware data transformation and a query authentication scheme which guarantees the data confidentiality and the query result integrity of sensitive data. To solve the original data leakage problem, we propose a bitmap-based data transformation scheme with anchor selection based on data distribution. We also devise an algebraic coding-based Hash index that transforms a query to a bitmap and retrieves the anchor information efficiently. To reduce the transmission overhead of verification data, we propose a query result authentication index that stores an encrypted signature for each anchor, which is an concatenated Hash Digest of cluster data. Through performance evaluation, we show that our scheme outperforms the existing method up to 15 times, in terms of query processing time and verification overhead.