Home / Journals / JCS / Vol.3, No.4, 2021
Special Issues
  • Open AccessOpen Access

    ARTICLE

    Research on ABAC Access Control Based on Big Data Platform

    Kun Yang1, Xuanxu Jin2, Xingyu Zeng1,*
    Journal of Cyber Security, Vol.3, No.4, pp. 187-199, 2021, DOI:10.32604/jcs.2021.026735 - 09 February 2022
    Abstract In the environment of big data, the traditional access control lacks effective and flexible access mechanism. Based on attribute access control, this paper proposes a HBMC-ABAC big data access control framework. It solves the problems of difficult authority change, complex management, over-authorization and lack of authorization in big data environment. At the same time, binary mapping codes are proposed to solve the problem of low efficiency of policy retrieval in traditional ABAC. Through experimental analysis, the results show that our proposed HBMC-ABAC model can meet the current large and complex environment of big data. More >

  • Open AccessOpen Access

    ARTICLE

    Linux Kali for Social Media User Location: A Target-Oriented Social Media Software Vulnerability Detection

    Adnan Alam Khan1,2,*, Qamar-ul-Arfeen1
    Journal of Cyber Security, Vol.3, No.4, pp. 201-205, 2021, DOI:10.32604/jcs.2021.024614 - 09 February 2022
    Abstract Technology is expanding like a mushroom, there are various benefits of technology, in contrary users are facing serious losses by this technology. Furthermore, people lost their lives, their loved ones, brain-related diseases, etc. The industry is eager to get one technology that can secure their finance-related matters, personal videos or pictures, precious contact numbers, and their current location. Things are going worst because every software has some sort of legacy, deficiency, and shortcomings through which exploiters gain access to any software. There are various ways to get illegitimate access but on the top is Linux More >

  • Open AccessOpen Access

    ARTICLE

    Data Anonymous Authentication for BIoMT with Proxy Group Signature

    Chaoyang Li1,*, Yalan Wang2, Gang Xu3, Xiubo Chen4, Xiangjun Xin1, Jian Li4
    Journal of Cyber Security, Vol.3, No.4, pp. 207-216, 2021, DOI:10.32604/jcs.2021.026926 - 09 February 2022
    Abstract Along with the increase of wearable medical device, the privacy leakage problem in the process of transmission between these edge medical devices. The blockchain-enabled Internet of Medical Things (BIoMT) has been developed to reform traditional centralized medical system in recent years. This paper first introduces a data anonymous authentication model to protect user privacy and medical data in BIoMT. Then, a proxy group signature (PGS) scheme has been proposed based on lattice assumption. This scheme can well satisfy the anonymous authentication demand for the proposed model, and provide anti-quantum attack security for BIoMT in the More >

  • Open AccessOpen Access

    ARTICLE

    A Distributed Secret Sharing Method with QR Code Based on Information Hiding

    Pengcheng Jiang, Yu Xue*
    Journal of Cyber Security, Vol.3, No.4, pp. 217-225, 2021, DOI:10.32604/jcs.2021.026022 - 09 February 2022
    Abstract QR codes are applied widely on the Internet and mobile devices in recent years. Its open standards and the characteristics of easy to generate lead to anyone can generate their QR code easily. Also, the QR code does not have the ability of hiding information, which leads to everyone can get access to read the content in any QR code, including those hiding some secret content in the bytes of QR code. Therefore, in recent years, information tampering and information leakage cases caused by poor security of two-dimensional code occur frequently, especially in the… More >

Per Page:

Share Link