Faculty Publications

Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736

Publications by NITK Faculty

Browse

Search Results

Now showing 1 - 2 of 2
  • Item
    Stride-based threat modeling for blockchain-based healthcare supply chain management system
    (Bentham Science Publishers, 2025) Harish, S.V.; Chandrasekaran, K.; Rathnamma; Divakarla, U.; Ramana, V.
    The increasing use of blockchain technology in supply chain management has made it imperative to understand the possible security risks associated with its implementation. This research aims to identify important security issues related to supply chain management's use of blockchain technology by doing a thorough analysis of the body of existing literature and looking at actual cases of blockchain deployments. These dangers include the possibility of data privacy breaches, smart contract weaknesses, and 51% attack vulnerability. The report also offers suggestions for reducing these risks, including using multi-factor authentication, regularly carrying out security audits, and enforcing strict access rules. The study's conclusions broaden our knowledge of the security risks associated with blockchain-based supply chain management (BC-SCM) and offer useful guidance to companies thinking about implementing this technology. © 2025 Bentham Science Publishers. All rights reserved.
  • Item
    Efficient privacy preserving ranked search over encrypted data
    (Institute of Electrical and Electronics Engineers Inc., 2016) Praseed, A.; Sudheesh, R.K.; Chandrasekaran, K.
    Cloud computing and its ever so increasing prominence has rendered it as an unavoidable component for data storage and other data services. The security challenges of storing sensitive data on the cloud is reduced to an extent by the Encryption of data, though in the process of encrypted data search, efficiency is compromised. The encrypted data on the cloud can be retrieved using Searchable Symmetric Encryption (SSE). The current work uses multi-keyword searchable encryption scheme with top-k retrieval to avoid compromises on data privacy occurred by using Order Preserving Encryption schemes. The encryption scheme uses homomorphic encryption and vector space model. The vector space model provides the required search accuracy. The homomorphic encryption allows majority of the computation to be done at the server side while concealing the sensitive data. The user alone can identify the final result of the relevance calculation and request for the actual file. In this paper, phrase searching is included to improve the search results on the encrypted data. To accomplish this we maintain a list of the keyword locations in the encrypted file index. The cloud server, which we assume to be honest-but-curious, operates on these encrypted values and identifies if the words occur in close proximity without knowing the actual locations of these words and the words itself. © 2015 IEEE.