Arama Sonuçları

Listeleniyor 1 - 2 / 2
  • Yayın
    Implementing lightweight, dynamic hierarchical key assignment scheme for cloud computing
    (IEEE, 2024-03-25) Çelikbilek, İbrahim; Çeliktaş, Barış; Özdemir, Enver
    In this paper, we propose the implementation and adaptation of a hierarchical key assignment scheme (HKAS) previously developed in our research to improve access control in cloud computing environments. The secret keys generated and managed by this scheme can be utilized for various purposes within the cloud computing, including data encryption, integrity checks, secure communications, and accessing critical infrastructures or services. Our implementation performs dynamic update operations with minimal computational cost and storage demands, as users within the hierarchical structure do not store any key components. Through security analysis, the scheme demonstrates strong key indistinguishability security (S-KI-security), effectively safeguarding keys against various cryptographic attacks. The scheme's flexibility allows it to be tailored to specific organizational needs, whether for securing sensitive data, ensuring compliance with regulatory standards, or facilitating secure data sharing and collaboration in cloud environments. Thus, we advocate for the practical implementation of the HKAS in transitioning to cloud environments.
  • Yayın
    Current benefits and future directions of NFC services
    (IEEE, 2010) Ok, Kerem; Coşkun, Vedat; Aydın, Mehmet Nafiz; Özdenizci Köse, Büşra
    Near Field Communication (NFC), as an emerging and promising technology, is an integration of Radio Frequency Identification (RFID) technology with mobile devices. NFC-enabled mobile devices can act as contactless smart cards and are also capable to read and write data from/to those cards. Research endeavours concerning NFC appear to focus mainly on development of NFC enabled services and applications. On the other hand, benefits and underlying values associated with different NFC applications' service is not yet well elaborated. In this paper we examined existing NFC applications, prototypes and studies from both academia and industry. We analyzed these applications by classifying them into NFC operating modes to surface the nature of underlying value-added services and benefits that they provide. Moreover we emphasized possible future usage scenarios together with directions and questions for future research based on the identified benefits.