You are on page 1of 5

Dumlao, Renel F

MIT 1
Information Security MIT 507
5 Reactions/Reviews

Title: Secure and Privacy-Preserving Data Services in the Cloud: A Data Centric View
Author: Divyakant Agrawal, Amr El Abbadi, Shiyuan Wang
Publisher/Published date: Journal/ Volume 5 Issue 12, August 2012, Pages 2028-2029

Review/Reaction:

This paper the researchers, focus on the critical features of ensuring data condentiality and
access privacy. To protect the condentiality of sensitive private data stored in the cloud,
encryption is a standard technique. Cloud computing becomes a successful paradigm for data
computing and storage. Increasing concerns about data security and privacy in the cloud,
however, have emerged. Ensuring security and privacy for data management and query
processing in the cloud is critical for better and broader uses of the cloud.

The author covers some common cloud security and privacy threats and the relevant research,
while focusing on the works that protect data confidentiality and query access privacy for
sensitive data being stored and queried in the cloud. The author provide a comprehensive study
of state-of-the-art schemes and techniques for protecting data confidentiality and access privacy,
which make different tradeoffs in the multidimensional space of security, privacy, functionality
and performance.
Dumlao, Renel F
MIT 1
Information Security MIT 507
5 Reactions/Reviews

Title: A Case Study of Malware Detection and Removal in Android Apps


Author: Wichien Choosilp and Yujian Fu
Publisher/Published date: International Journal of Mobile Network Communications &
Telematics (IJMNCT) Vol. 4, No.2, April 2014

Review/Reaction:
Android is a mobile operating system developed by Google, based on the Linux kernel and
designed primarily for touch screen mobile devices such as Smartphone and tablets. Due to
spreading of malware, Android OS is the target devices in the course of malicious applications
are called mobile malware. This paper, the authors presented a case study on existing android
malware detection through a sequence of steps and well developed encoding SMS message.

However, the application used is programmable using JAVA and focus on the four (4)
components which is namely activities, services, broadcast receivers, and content providers.
Therefore, the result has demonstrated a solid testify of the approach in the effectiveness of
malware detection and removal.
Dumlao, Renel F
MIT 1
Information Security MIT 507
5 Reactions/Reviews

Title: Enforcing Database Security using Encryption and Secure Database Catalog
Author: Surya Pratap Singh, Akhilesh Kumar Mishra, Arvind Kumar Maurya, Upendra Nath Tripathi
Publisher/Published date: International Journal of Engineering Research & Technology
(IJERT) ISSN: 2278-0181, Vol. 5 Issue 01, January-2016

Review/Reaction:

A better understanding of database security is still required. The researchers, studied that
database security is very essential in this environment because at every online activities database
is required and if for any reason the database security is compromised then this will become a
major threat to sensitive and confidential information. Various database researchers proposed
methods to protect the database form these vulnerabilities but none of the approach is fully able
to protect the database form all kinds of security threats. One of the most popular methods to
ensure the database security is through cryptography. In this paper the proponents, propose the
use of Secure Database Catalog to store the encrypted data of the users in database to protect the
information in database.
However, the Secure Database Catalog in its functions and security properties; (a) The updating
of the Catalog is protected by manual updating by users (including DBA), (b) The access of the
Catalog is protected by a very strict authentication process like biometric or multilevel password
protection.
Dumlao, Renel F
MIT 1
Information Security MIT 507
5 Reactions/Reviews

Title: Network Security: An Approach Towards Secure Computing


Author: Rahul Pareek
Publisher/Published date: Journal of Global Research in Computer Science, Volume 2, No. 7,
July 2011

Review/Reaction:
The security of computer networks plays a strategic role in modern computer systems. In order to
enforce high protection levels against malicious attack, a number of software tools have been
currently developed. Intrusion Detection System has recently become a heated research topic due
to its capability of detecting and preventing the attacks from malicious network users. A pattern
matching IDS for network security has been proposed in this paper. Many network security
applications rely on pattern matching to extract the threat from network traffic. The increase in
network speed and traffic may make existing algorithms to become a performance bottleneck.
Therefore it is very necessary to develop faster and more efficient pattern matching algorithm in
order to overcome the troubles on performance.
Dumlao, Renel F
MIT 1
Information Security MIT 507
5 Reactions/Reviews
Title: Password policy: The good, the bad, and the ugly
Author: Dr. Wayne C. Summers and Dr. Edward Bosworth
Available at:
https://www.researchgate.net/publication/234799064_Password_policy_The_good_the_bad_and
_the_ugly

Review/Reaction:
A password is a word or string of characters used for user authentication to prove identity
or access approval to gain access to a resource which is to be kept secret from those not allowed
access. The researcher study and focuses on the use of passwords and password policy and looks
at the good, the bad and the ugly scenarios that arise. The researcher discusses the effect of good,
bad and ugly password based on the most organizational. The good password the administrator
will enforce a password policy. Passwords must be protected.
Therefore, this can be accomplished by the system using strong encryption and
protected shadow files. Users have to be educated about the importance of
keeping their passwords private. Users must be educated about the dangers of
writing the password down, even in a secret hiding place.