StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Privacy-Enhancing Security Mechanisms - Research Proposal Example

Cite this document
Summary
[Your full name] [Instructor’s full name] October 02, 2011 Introduction Wireless networks have almost become an essential part of our daily life. People send large amounts of sensitive data over the networks to their desired destinations…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful
Privacy-Enhancing Security Mechanisms
Read Text Preview

Extract of sample "Privacy-Enhancing Security Mechanisms"

Download file to see previous pages

There also exist some privacy-preserving protocols that are being widely used in different technologies, such as, wireless sensor networks, mobile computing, and data mining operations. In this paper, we will discuss the technique to design a reliable and efficient privacy-preserving scheme in order to ensure increased security of data over the network. Problem Statement The problem statement for the research paper is: "Design and analysis of privacy-preserving network and cryptographic protocols" Conceptual Framework Aim of the Research In realistic networked environments, data security is the main focus of the management.

Although there are several protocols and security mechanisms available for the protection of sensitive information, yet the security of the networked environments cannot be fully guaranteed. Generation of a reliable secret key can play a considerable role in this regard which should encrypt and decrypt the data while ensuring data integrity and authentication. There is a need to design and implement privacy-enhanced cryptographic protocols using private handshaking, which should be able to provide optimum security to the sensitive information being transferred using mobile and messaging services.

We will focus on designing a new pair wise key management scheme, which will include the properties of digital signatures and blindness along with the use of private handshakes. The key management scheme will make use of Boneh and Shacham's group signature scheme to ensure privacy and security in wireless networks. Literature Review Das and Giri state that pair wise key establishment enables sensor nodes to communicate securely in a sensor network with other nodes with the use of cryptographic techniques.

Bista and Chang state, “Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node”. Privacy is integral for wireless networks and instant messaging. Patil and Kobsa state, “Inadequate support for managing privacy could lead to suboptimal use of IM and thereby undermine its benefits”. Privacy-preserving network protocols play an important role in ensuring securing of data being transferred over the network.

Privacy-preserving authentications achieve traditional goals as well as privacy of the authenticator and the verifier (Xu and Yung). Two of the main Privacy-Preserving Network Protocols include TOR and Off-the-record messaging. Off-the-record messaging techniques will be used because it enables private conversations over the wireless networks using the concept of encryption, authentication, deniability, and perfect forward secrecy. Cryptographic protocols will also be an important part of the research because they use such algorithms which ensure security of information over the network.

“For the past three decades, a wide variety of cryptographic protocols have been proposed to solve secure communication problems” (Shin). “Modern cryptography is concerned with the construction of systems that are robust against malicious attempts” (Goldreich). Cryptographic protocoal serve good when used in combinations, such as, ? 1, some ? 2s. “Although cryptographic protocols are typically analyzed in isolation, they are used in combinations” (Guttman). Lindell and Pinkas state, “Cryptographers seek to make secure protocols as efficient as possible in order to minimize the performance gap between secure and naive

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Privacy-Enhancing Security Mechanisms Research Proposal”, n.d.)
Privacy-Enhancing Security Mechanisms Research Proposal. Retrieved from https://studentshare.org/information-technology/1432679-privacy-enhancing-security-mechanisms
(Privacy-Enhancing Security Mechanisms Research Proposal)
Privacy-Enhancing Security Mechanisms Research Proposal. https://studentshare.org/information-technology/1432679-privacy-enhancing-security-mechanisms.
“Privacy-Enhancing Security Mechanisms Research Proposal”, n.d. https://studentshare.org/information-technology/1432679-privacy-enhancing-security-mechanisms.
  • Cited: 0 times

CHECK THESE SAMPLES OF Privacy-Enhancing Security Mechanisms

Comparisong between the Bell-LaPadula model and the Biba model

These two models reflects similarity in concepts, however, Biba model is more specific towards information integrity, as this pillar of information security was not addressed by Bell LaPadula model.... Bell LaPuda model does not address enforcement of privacy requirements associated with purpose binding....
3 Pages (750 words) Essay

Technology and HIPAA Privacy Regulations

nbsp;  The renewed sense of privacy and security in health care sector attributed to it by this new legislation had its unique impact on technology as well.... But the threats to privacy and security that emerged from the very use of this new technologies, has to be addressed by technology itself.... Technology and HIPAA Privacy Regulations: The Problem Becoming the Solution Introduction The Health Insurance Portability and Accountability Act (HIPAA) of 1996 and the Privacy and security Rules under it, are meant to protect the many aspects of privacy and security of the health care services customer....
5 Pages (1250 words) Term Paper

Depersonalization and the Protection of Personal Privacy

Governments collect them for the evaluation of its programs or for use databases such as in law enforcement and social security.... There are the databases from Social security Administration, Federal Bureau of Investigation, Medical Information Bureau, state criminal justice systems, municipal data systems, credit card companies, telephone companies, Medicaid, and, recently, Google, Facebook and so much more.... The method of personal data collection, its use and security, hence, necessitate citizen protection....
5 Pages (1250 words) Research Paper

The EU and US Data Protection Approaches and their Sustainability

hellip; This essay discusses the issue of data security that has become the centre of reputation building for organizations and governments today all over the world.... This essay describes different approaches that the United States and European Union have on data protection and data sustainability....
10 Pages (2500 words) Essay

Cyber Security as the Process of Different Security Measures

This essay analyzes that Cyber security refers to the process of applying different security measures to foster integrity, confidentiality, and accessibility of data.... Cyber security ensures the protection of assets of an organization, including servers, data, buildings, humans, and desktops.... hellip; This essay discusses that national security, economic vitality, and daily life of individuals vastly depend on safe, resilient, and stable cyberspace....
6 Pages (1500 words) Essay

Computer Security

The paper gives detailed information about the computer security.... nbsp;Therefore, computer system security is considered to be the vital aspect of any organization.... Furthermore, web-based technology and digital companies make it simple to collect, incorporate, and share business information, offering new fears regarding the suitable usage of customer details, the safety of individual confidentiality, as well as the security of intellectual property of the organization (Armor2net Software Ltd....
9 Pages (2250 words) Research Paper

Privacy, Security and Anoymity in P2P networks for Multimedia Distribution: Challenges and Solutions

Essentially, one needs to examine the security of the system with respect to connection control, operation and access control, and the mechanisms for protecting the stored data.... According to Feldman, the connection and operation mechanisms should assume the first priority because they determine the overall security of P2P systems.... Particularly, the study focuses on the technology in the aspect of the security, privacy, and anonymity.... The popularity of these networks has elicited the need of examining the security consequences of the system to the users, networks, and institutions....
6 Pages (1500 words) Research Paper

Cloud Computing and Threats to Corporate Privacy

These advantages have a direct impact on IT budgets and associated costs but also give rise to issues of security, trust, and privacy.... … The paper “Cloud Computing and Threats to Corporate Privacy” is an actual example of a research paper on information technology....
18 Pages (4500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us