10/28/2022 0 Comments Vuze privacy view![]() ![]() ![]() Today's technical and legal landscape presents formidable challenges to personal data privacy. Finally, we have analyzed the robustness of XTRA to popular security attacks. We have validated the performance XTRA through a working prototype implementation and present results comparing it with two state-of-the-art techniques. Participating peers send data over an encrypted covert channel making use of only the standard bit-torrent message types. Under this framework, covert peers authenticate each other prior to covert message exchanges. In this paper, we propose XTRA-a framework for covert communication using the standard bit-torrent protocol with a robust handshake process for authentication among covert peers. The standard P2P bit-torrent peer wire communication protocol uses a very simple handshake process and as such does not provide peer authentication service. Considering that, preventing covert channel information sharing is inconceivable given even its detection is near impossible. Consequently, it is a daunting task to prevent sharing of both legitimate and illegitimate information such as-music, movies, software, and child pornography-on P2P overt channels. Today, peer-to-peer (P2P) networks have risen to the top echelon of information sharing on the Internet. We present algorithms for an enhanced encryption and decryption, and introduce the property of Ciphertext Expiration. In this paper we introduce the Entrance system architecture, requirements and basic use-cases before we reach our main contribution: we discuss challenges and provide solutions arisingįrom applying a Distributed Hash Table (DHT) for an Attributebased Encryption (ABE) key distribution. A central aspect is to increase management capabilities, such as revocation for the data to be shared, while supporting fine grained access policies provided by Attribute-based Encryption (ABE). We envision a decentralized and data-owner-centric system, capable to support secure data sharing within private or business driven scenarios. Efforts to store citizens’ medical data centrally, driven by political, economic or ITsecurity reasons, bear the risk of data leakage. A central data storage, which is applied by Online Social Networks (OSN), such as Facebook or driven by the government, such as storing medical health data of citizens centrally, is likewise affected. However, several disadvantages exist, such as the loss of control over data or unwanted data processing and analysis by providers. Today, sharing information is ubiquitous in a connected world. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |