Open Access
ARTICLE
Kun Yang1, Xuanxu Jin2, Xingyu Zeng1,*
Journal of Cyber Security, Vol.3, No.4, pp. 187-199, 2021, DOI:10.32604/jcs.2021.026735
Abstract In the environment of big data, the traditional access control lacks
effective and flexible access mechanism. Based on attribute access control, this
paper proposes a HBMC-ABAC big data access control framework. It solves the
problems of difficult authority change, complex management, over-authorization
and lack of authorization in big data environment. At the same time, binary
mapping codes are proposed to solve the problem of low efficiency of policy
retrieval in traditional ABAC. Through experimental analysis, the results show
that our proposed HBMC-ABAC model can meet the current large and complex
environment of big data. More >
Open Access
ARTICLE
Adnan Alam Khan1,2,*, Qamar-ul-Arfeen1
Journal of Cyber Security, Vol.3, No.4, pp. 201-205, 2021, DOI:10.32604/jcs.2021.024614
Abstract Technology is expanding like a mushroom, there are various benefits of
technology, in contrary users are facing serious losses by this technology.
Furthermore, people lost their lives, their loved ones, brain-related diseases, etc.
The industry is eager to get one technology that can secure their finance-related
matters, personal videos or pictures, precious contact numbers, and their current
location. Things are going worst because every software has some sort of legacy,
deficiency, and shortcomings through which exploiters gain access to any software.
There are various ways to get illegitimate access but on the top is Linux Kali with
QRLjacker by user… More >
Open Access
ARTICLE
Chaoyang Li1,*, Yalan Wang2, Gang Xu3, Xiubo Chen4, Xiangjun Xin1, Jian Li4
Journal of Cyber Security, Vol.3, No.4, pp. 207-216, 2021, DOI:10.32604/jcs.2021.026926
Abstract Along with the increase of wearable medical device, the privacy leakage
problem in the process of transmission between these edge medical devices. The
blockchain-enabled Internet of Medical Things (BIoMT) has been developed to
reform traditional centralized medical system in recent years. This paper first
introduces a data anonymous authentication model to protect user privacy and
medical data in BIoMT. Then, a proxy group signature (PGS) scheme has been
proposed based on lattice assumption. This scheme can well satisfy the anonymous
authentication demand for the proposed model, and provide anti-quantum attack
security for BIoMT in the future general quantum computer age.… More >
Open Access
ARTICLE
Pengcheng Jiang, Yu Xue*
Journal of Cyber Security, Vol.3, No.4, pp. 217-225, 2021, DOI:10.32604/jcs.2021.026022
Abstract QR codes are applied widely on the Internet and mobile devices in
recent years. Its open standards and the characteristics of easy to generate lead to
anyone can generate their QR code easily. Also, the QR code does not have the
ability of hiding information, which leads to everyone can get access to read the
content in any QR code, including those hiding some secret content in the bytes
of QR code. Therefore, in recent years, information tampering and information
leakage cases caused by poor security of two-dimensional code occur frequently,
especially in the financial field and multi-party verification scenarios.… More >