Faculty Publications

Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736

Publications by NITK Faculty

Browse

Search Results

Now showing 1 - 10 of 52
  • Item
    Decoupling security concerns in web services using aspects
    (2006) Mostéfaoui, G.K.; Narendra, N.C.; Maamar, Z.; Sattanathan, S.
    This paper discusses the Aspect-oriented Framework for Web services (AoF4WS) that supports on-demand context-sensitive security in Web services. Flexible security schemes are needed in many Web services applications where authentication, authorization, etc., can no longer be used in their current form. Security mechanisms are to be customized to the continuously changing requirements of Web services. Examples of this customization concern cryptographic protocol for a specific situation and timeout for user credentials. The AoF4WS uses aspect-oriented programming and frames. Aspects provide flexibility to the framework, and frames adjust aspects to specific requirements. © 2006 IEEE.
  • Item
    Context-driven policy enforcement and reconciliation for Web services
    (2006) Sattanathan, S.; Narendra, N.C.; Maamar, Z.; Mostéfaoui, G.K.
    Security of Web services is a major factor to their successful integration into critical IT applications. An extensive research in this direction concentrates on low level aspects of security such as message secrecy, data integrity, and authentication. Thus, proposed solutions are mainly built upon the assumption that security mechanisms are static and predefined. However, the dynamic nature of the Internet and the continuously changing environments where Web services operate require innovative and adaptive security solutions. This paper presents our solution for securing Web services based on adaptive policies, where adaptability is satisfied using the contextual information of the Web services. The proposed solution includes a negotiation and reconciliation protocol for security policies.
  • Item
    A framework for intrusion tolerance in cloud computing
    (2011) Karande, V.M.; Pais, A.R.
    Cloud Computing has been envisioned as the next generation architecture and one of the fastest growing segments of the IT enterprises. No matter how much investment is made in cloud intrusion detection and prevention, cloud infrastructure remains vulnerable to attacks. Intrusion Tolerance in Cloud Computing is a fault tolerant design approach to defend cloud infrastructure against malicious attacks. Thus to ensure dependability we present a framework by mapping available Malicious and Accidental Fault Tolerance for Internet Applications (MAFTIA) intrusion tolerance framework for dependencies such as availability, authenticity, reliability, integrity, maintainability and safety against new Cloud Computing environment. The proposed framework has been validated by integrating Intrusion Tolerance via Threshold Cryptography (ITTC) mechanism in the simulated cloud environment. Performance analysis of the proposed framework is also done. © 2011 Springer-Verlag.
  • Item
    Web security: A survey of latest trends in security attacks
    (2011) Kallapur, P.V.; Geetha, V.
    Every system used in real time will be having some security threats. Internet has not been exception for it. From as early as 1980s there has been occurrence of several different types of security attacks with Internet being their major target. Internet happens to be main target due to type and amount of information it stores and advancements in computer networks which makes it very easy for accessing the same. Also, at the same time limitations/design flaws in Internet design, programming languages etc. make attack techniques to evolve from day to day. Due to such evolution of new attack mechanisms, at present, we have a big list of different attacks. Further, motivations for making such attacks range from just having fun to sabotaging critical & specific infrastructures at national level. Hence, in this context, it is very necessary and useful to know about latest trends in security attacks. In this connection this paper provides a brief survey of latest security attacks on web. This paper also provides a summarized comparison of discussed attacks against chosen important parameters. In addition, an observational data about attacks via Emails over a period of time is also presented. The paper concludes by mentioning the need of such surveys and research opportunities in this area. © 2011 Springer-Verlag.
  • Item
    Web security: Research challenges and open issues
    (2011) Geetha, V.; Kallapur, P.V.
    It has been observed for a quite long time that Web Security has been one of hot research areas, from point of view of be it either analysis or detection and later developing mitigation plans. Web security threats have undergone much sophistication compared to their initial introduction and they are becoming more & more evolved everyday. The evolution might be in terms of new ways of attack or bringing in resistance to using simulated OS or VM environments. Also, there has been considerable shift in the target of attacks in recent years. Earlier, clients were ignored while choosing targets. But, in recent years client user has become the main target for attacks as the adversary believe that the end user is the weakest link in the security chain. As a result of all these latest developments traditional security tools have been ineffective against these new attacks either for detecting or analyzing the attacks. In this regard this paper presents a brief survey of research challenges and open issues in the area of web security under the suitable subtitles depending upon type of attack associated with the issues. © 2011 Springer-Verlag.
  • Item
    Securing cloud workflows using Aggressive Chinese Wall Security Policy
    (Institute of Electrical and Electronics Engineers Inc., 2014) Anupa, J.; Chandra Sekaran, K.C.
    Workflow Management Systems (WfMSs) help big enterprises in automation of their business processes and thus help the management to take critical decisions fast. The WfMSs can be combined with the power of Cloud Computing to harness the strengths of both the technologies. The use of WfMSs for critical and strategic applications, which is common in case of business and scientific community, gives rise to major concerns regarding the threats against integrity, authorization, availability etc. Security is a major concern in case of the Cloud Computing platform too. The Aggressive Chinese Wall Security Policy (ACWSP) aims at mitigating the conflict of interest scenarios in commercial organizations. This paper discusses how to implement ACWSP in WfMSs along with the Role Based Access Control (RBAC) through an API. Further this paper throws light on how the ACWSP can be applied to various layers in the Cloud Computing Service Model. © 2014 IEEE.
  • Item
    Cloud workflow and security: A survey
    (Institute of Electrical and Electronics Engineers Inc., 2014) Anupa, J.; Chandra Sekaran, K.C.
    The cloud revolution has helped enterprises to improve their business and performance by providing them computing power, storage capabilities and a variety of services for very less or no infrastructure and reasonable cost. It also provisioned the scientific and academic communities to run complex applications involving large data sets, high performance or distributed resources. The Workflow Management Systems (WfMSs) help the enterprises in automation of their business processes and thus help the management to take critical decisions fast. Cloud Workflows club the advantages of both Cloud Computing and WfMSs. In spite of the advantages of the cloud, security is a major area of concern. The use of WfMSs for critical and strategic applications, which is common in case of Business and Scientific community, gives rise to major concerns regarding the threats against integrity, authorization, availability etc. The concept of running secure workflow instances on public cloud processing platforms is still in its infancy. This paper gives an overview of workflow management systems, cloud computing, cloud workflows and security in these areas. This paper also provides a survey on security mechanisms for WfMSs and Cloud Workflows. © 2014 IEEE.
  • Item
    A Privacy Preserved Data Mining Approach Based on k-Partite Graph Theory
    (Elsevier, 2015) Bhat, T.P.; Karthik, C.; Chandrasekaran, K.
    Traditional approaches to data mining may perform well on extraction of information necessary to build a classification rule useful for further categorisation in supervised classification learning problems. However most of the approaches require fail to hide the identity of the subject to whom the data pertains to, and this can cause a big privacy breach. This document addresses this issue by the use of a graph theoretical approach based on k-partitioning of graphs, which paves way to creation of a complex decision tree classifier, organised in a prioritised hierarchy. Experimental results and analytical treatment to justify the correctness of the approach are also included. © 2015 The Authors.
  • Item
    An efficient framework and access control scheme for cloud health care
    (Institute of Electrical and Electronics Engineers Inc., 2016) Saravana, N.; Rajya Lakshmi, G.V.; Annappa, B.
    Cloud computing is being a potential role in providing services for utilizing a huge data in various application, as it is ubiquitous. In emerging growth of Cloud services been focused on security issues and optimal data storage used by consumers. Eventually, the Cloud storage is the best way to keep essential business data secure and accessible. Along with that, there are few important feature been considered. i.e( file versioning, automatic sync,collaboration tools, security File Encryption). In our research article, the framework is designed for real-time Healthcare business application to be achieved all the essential features with Inter-Cloud data storage.To do additionally, has been implemented and tested by an efficient CP-ABE (Cipher Policy-Attribute Based Encryption) algorithm for secure data transmission. Outcomes were powerful in a such way that can be promised in a designed framework developed in Python 3 in Charm-Cryptography. © 2015 IEEE.
  • Item
    An efficient and secure authentication scheme with user anonymity for roaming service in global mobile networks
    (Association for Computing Machinery acmhelp@acm.org, 2016) Madhusudhan, R.; Shashidhara
    In global mobile network, it is essential to authenticate mobile users and provide secure communication between a user, foreign agent and the home agent using session key. Designing a secure and efficient authentication protocol for roaming users in mobile network is a challenging. The authors wen et al. analyzed Jiang et al. authentication scheme recently and proved that the scheme cannot resist with replay attack and stolen-verifier attack. Later, they come up with a smart card based authentication scheme for roaming service. The Wen et al.'s scheme protects anonymity of the user and is believed to have many abilities to resist a various kind of cryptographic attacks. However, through careful analysis, we find that Wen et al.'s scheme is vulnerable to bit flipping attack, impersonation (forgery attacks), insider attack, denial-of-service attack, unfair key agreement and cannot provide user's anonymity. To remedy these weaknesses and to achieve low communication and computation costs, we proposed an efficient secure authentication scheme for roaming users in global mobile networks. The performance analysis shows that the proposed authentication protocol is simple and secure. © 2016 ACM.