Loading...
Search for: selective-encryption
0.006 seconds

    Missing a trusted reference monitor: How to enforce confidential and dynamic access policies?

    , Article Communications in Computer and Information Science ; Vol. 428, issue , Oct , 2014 , p. 92-104 ; ISSN: 18650929 ; ISBN: 978-3319109022 Karimi, L ; Javadi, S. A ; Hadavi, M. A ; Jalili1, R ; Sharif University of Technology
    Abstract
    Popularity of data outsourcing and its consequent access control issues such as dynamism and efficiency is the main motivation of this paper. Existing solutions suffer from the potential unlimited number of user keys, inefficient update of policies, and disclosure of data owner’s access control policies. Using Chinese remainder theorem and proxy re-encryption together, in this paper, we propose an efficient access control enforcement mechanism based on selective encryption that addresses all the shortages. The overall architecture, required algorithms, and access control policy update are discussed. The mechanism is evaluated through simulation and, the given results are satisfactory  

    A Secrecy-Preserving Access Control in Data Outsourcing Scenario

    , M.Sc. Thesis Sharif University of Technology Karimi, Leila (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    One of the security issues in data outsourcing scenario is the enforcement of data owner’s access control policies. This includes three challenges; 1) the average number of keys needed to access authorized resources, 2) efficient update of policies, and 3) confidentiality of data owner’s access control policies. Most of the existing proposed solutions address only one of these challenges, while they impose high overhead on both the data owner and users. Such an overhead prevents the model to be implemented in practical applications. In this thesis, we propose an approach to address all the aforementioned challenges with acceptable overhead. In this approach, which is based on selective... 

    Selective Video Encryption Using Spatial Information in H.265/HEVC Standard

    , M.Sc. Thesis Sharif University of Technology Ashrafi, Mohsen (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor) ; Zargari Asl, Farzad (Co-Advisor)
    Abstract
    Video encryption algorithms have become an important field of research nowadays. As the increasing rate of employing videos in commerce and other visual applications , the security of video data is becoming more vital. A digital media can be transmitted easily in real time everywhere at any time due to the advanced development of communications, Internet and multimedia technology. As a result information availability has increased naturally with the introduction of mobile devices. However, this availability faces with the problem of maintaining the security of information that is transmitted in public channels.
    The new version of video coding standard that is...