Explore chapters and articles related to this topic
Applications of Blockchain Technology in Cyber Attacks Prevention
Published in Keshav Kaushik, Shubham Tayal, Susheela Dahiya, Ayodeji Olalekan Salau, Sustainable and Advanced Applications of Blockchain in Smart Computational Technologies, 2023
J. E. T. Akinsola, M. A. Adeagbo, S. A. Akinseinde, F. O. Onipede, A. A. Yusuf
SQL injection is an unforeseen consequence or attack like authorization of mechanisms and circumvention of authentication that occurs when specifically constructed input can provoke an application into mis-constructing a database command allowing modification, deletion, retrieving and addition of attack and records compromising the integrity of a database and the applications it provides (Chen et al., 2018). Availability, integrity, confidentiality and functionality of any web application databases are threatened by Structured Query Language Injection Attack (SQLIA). Dynamic leakage, static leakage, spoofing and linkage leakage are other examples of attack that endanger database security (Abimbola & Zhangfang, 2020).
Ethereum Blockchain-Based Authentication Approach for Data Sharing in Cloud Storage Model
Published in Cybernetics and Systems, 2023
Geethu Mary George, L. S. Jayashree
Blockchain System (BS): A blockchain is fundamentally a digital ledger of transactions which is duplicated and distributed over the complete computer systems network on the blockchain. Using cryptography the blockchain records are protected, wherein network users have their own private and secure keys. This key is allocated directly to the transaction keys, and it operates as a personalized digital signature. Generally, the blockchain can be exploited by cloud users to increase the trust and provide security of data when outsourcing and attaining services from the Cloud. Blockchain can provide advanced security while comparing with the centralized database security. The blockchain model comprises three entities, which are the system administrator, contracts administrator, and a group of contracts. Security Association (SA) utilizes the registration of all users and users' requests to alter their data for attaining verification. SA divides private keys, public keys, and address that are produced by public keys among user. Users aim to retrieve the data by determining the hash value of earlier altered data and downloading them from the cloud to ensure prior alterations to documents containing invalid and valid alterations.
A computational journey in the true north
Published in International Journal of Parallel, Emergent and Distributed Systems, 2020
Since ancient times, cryptography had been used primarily in military operations, in diplomatic and intelligence activities, and in the protection of industrial secrets. By the late 1970s, cryptography emerged as an endeavour of public interest. It is a that time that I became involved in cryptographic research. In the early 1980s, I consulted for Unican Security Systems, a Canadian company based in Montreal, and one of the world's largest makers of key blanks, locks, and key-copying machines. The company was looking to develop digital security protocols for its electronic hotel locks. I cannot describe here the solution that I designed for their problem, as it remains an industrial secret. In fact, to this day, I do not know whether the cryptographic system that I recommended for their use (or a variant of it) ever made it into a product. On the other hand, my academic team's work in cryptography was widely published. It focussed primarily on cryptosystems [57–59], digital signatures [60–64], access control in a hierarchy [65–67], and database security [68–71].
A novel machine learning approach for database exploitation detection and privilege control
Published in Journal of Information and Telecommunication, 2019
Machine learning such as deep neural network has gained a lot of attention in the application to cybersecurity in recent times as security breaches and threats are getting sophisticated over times and a highly responsive machine learning approach is needed to counteract against them. Authors in (Trejo, Clempner, & Poznyak, 2018) proposed the use of reinforcement learning (RL) for Stackelberg security games through deploying attackers versus defenders strategies against the environment in order to win and they present the application of their proposed RL approach to several security scenarios. Authors in (Buczak & Guven, 2016) use RL to monitor and analyze the autonomous vehicle's dynamics as it is subjected to cyber and physical attacks on its sensory devices and systems. Then use RL to learn and find the best approach to rebel against the cyber-attacks. its uses a combination of deep q-learning and long-short term neural network to find the maximum possible deviation and seek the optimum solution. Another in (Partha, Bardhan, Chowdhury, & Phadikar, 2017) use a similar approach where the RL has been the foundation for the author’s approach to detect and counteract against cyber-attacks in the cloud computing domain. Based on these finding, it is proper that RL should be considered to enhance database security.