Sumon Biswas
Sumon Biswas
Home
Publication
Service
Projects
Teaching
News
Blogs
Contact
Light
Dark
Automatic
Security
Public Key Encryption (PEKS) with Bloom Filter
PEKS with Keyword Search is one of the most used method to search keywords over encrypted data. However, semantic security is not preserved and dictionary attack can help attackers to guess keywords. This project solves that issue implementing PEKS and searching keywords over Bloom Filter.
Oct 2, 2017
GitHub
Path ORAM (Oblivious Random Access Memory)
While using cloud platform or any other insecure memory, attack can be made using the access pattern. Oblivious RAM is the way to hide the memory access pattern with some extra bandwidth and memory overhead. Path ORAM uses a binary tree to store all memory blocks and changes the location of the blocks repeatedly to access the whole branch for a single block.
Jan 13, 2017
GitHub
A Secure Data Security Infrastructure for Small Organization in Cloud Computing
This paper shows a concern on the security element in cloud environment for small business addressing their shortcomings and finding solutions for it. Measured security features have been implemented by developing a secured data encryption, exchange and decryption infrastructure resulting in a data security model.
Manan B T Noor
,
Sumon Biswas
Cite
DOI
PDF
Cite
×