46 resultados para secure platform
Resumo:
Regenerating codes are a class of codes for distributed storage networks that provide reliability and availability of data, and also perform efficient node repair. Another important aspect of a distributed storage network is its security. In this paper, we consider a threat model where an eavesdropper may gain access to the data stored in a subset of the storage nodes, and possibly also, to the data downloaded during repair of some nodes. We provide explicit constructions of regenerating codes that achieve information-theoretic secrecy capacity in this setting.
Resumo:
We propose a light sheet based imaging flow cytometry technique for simultaneous counting and imaging of cells on a microfluidic platform. Light sheet covers the entire microfluidic channel and thus omits the necessity of flow focusing and point scanning based technology. Another advantage lies in the orthogonal detection geometry that totally cuts-off the incident light, thereby substantially reducing the background in the detection. Compared to the existing state-of-art techniques the proposed technique shows marked improvement. Using fluorescently-coated Saccharomyces cerevisiae cells we have recorded cell counting with throughput as high as 2,090 cells/min in the low flow rate regime and were able to image the individual cells on-the-go. Overall, the proposed system is cost-effective and simple in channel geometry with the advantage of efficient counting in operational regime of low laminar flow. This technique may advance the emerging field of microfluidic based cytometry for applications in nanomedicine and point of care diagnostics. Microsc. Res. Tech. 76:1101-1107, 2013. (c) 2013 Wiley Periodicals, Inc.
Resumo:
In this paper, we propose a novel authentication protocol for MANETs requiring stronger security. The protocol works on a two-tier network architecture with client nodes and authentication server nodes, and supports dynamic membership. We use an external membership granting server (MGS) to provide stronger security with dynamic membership. However, the external MGS in our protocol is semi-online instead of being online, i.e., the MGS cannot initiate a connection with a network node but any network node can communicate with the MGS whenever required. To ensure efficiency, the protocol uses symmetric key cryptography to implement the authentication service. However, to achieve storage scalability, the protocol uses a pseudo random function (PRF) to bind the secret key of a client to its identity using the secret key of its server. In addition, the protocol possesses an efficient server revocation mechanism along with an efficient server re-assignment mechanism, which makes the protocol robust against server node compromise.
Resumo:
A label-free biosensor has been fabricated using a reduced graphene oxide (RGO) and anatase titania (ant-TiO2) nanocomposite, electrophoretically deposited onto an indium tin oxide coated glass substrate. The RGO-ant-TiO2 nanocomposite has been functionalized with protein (horseradish peroxidase) conjugated antibodies for the specific recognition and detection of Vibrio cholerae. The presence of Ab-Vc on the RGO-ant-TiO2 nanocomposite has been confirmed using electron microscopy, Fourier transform infrared spectroscopy and electrochemical techniques. Electrochemical studies relating to the fabricated Ab-Vc/RGO-ant-TiO2/ITO immunoelectrode have been conducted to investigate the binding kinetics. This immunosensor exhibits improved biosensing properties in the detection of Vibrio cholerae, with a sensitivity of 18.17 x 10(6) F mol(-1) L-1 m(-2) in the detection range of 0.12-5.4 nmol L-1, and a low detection limit of 0.12 nmol L-1. The association (k(a)), dissociation (k(d)) and equilibrium rate constants have been estimated to be 0.07 nM, 0.002 nM and 0.41 nM, respectively. This Ab-Vc/RGO-ant-TiO2/ITO immunoelectrode could be a suitable platform for the development of compact diagnostic devices.
Resumo:
In this paper, we consider the security of exact-repair regenerating codes operating at the minimum-storage-regenerating (MSR) point. The security requirement (introduced in Shah et. al.) is that no information about the stored data file must be leaked in the presence of an eavesdropper who has access to the contents of l(1) nodes as well as all the repair traffic entering a second disjoint set of l(2) nodes. We derive an upper bound on the size of a data file that can be securely stored that holds whenever l(2) <= d - k +1. This upper bound proves the optimality of the product-matrix-based construction of secure MSR regenerating codes by Shah et. al.
Resumo:
Graphene layers have been transferred directly on to paper without any intermediate layers to yield G-paper. Resistive gas sensors have been fabricated using strips of G-paper. These sensors achieved a remarkable lower limit of detection of similar to 300 parts per trillion (ppt) for NO2, which is comparable to or better than those from other paper-based sensors. Ultraviolet exposure was found to dramatically reduce the recovery time and improve response times. G-paper sensors are also found to be robust against minor strain, which was also found to increase sensitivity. G-paper is expected to enable a simple and inexpensive low-cost flexible graphene platform
Resumo:
Predicting clinical response to anticancer drugs remains a major challenge in cancer treatment. Emerging reports indicate that the tumour microenvironment and heterogeneity can limit the predictive power of current biomarker-guided strategies for chemotherapy. Here we report the engineering of personalized tumour ecosystems that contextually conserve the tumour heterogeneity, and phenocopy the tumour microenvironment using tumour explants maintained in defined tumour grade-matched matrix support and autologous patient serum. The functional response of tumour ecosystems, engineered from 109 patients, to anticancer drugs, together with the corresponding clinical outcomes, is used to train a machine learning algorithm; the learned model is then applied to predict the clinical response in an independent validation group of 55 patients, where we achieve 100% sensitivity in predictions while keeping specificity in a desired high range. The tumour ecosystem and algorithm, together termed the CANScript technology, can emerge as a powerful platform for enabling personalized medicine.
Resumo:
We consider the basic bidirectional relaying problem, in which two users in a wireless network wish to exchange messages through an intermediate relay node. In the compute-and-forward strategy, the relay computes a function of the two messages using the naturally occurring sum of symbols simultaneously transmitted by user nodes in a Gaussian multiple-access channel (MAC), and the computed function value is forwarded to the user nodes in an ensuing broadcast phase. In this paper, we study the problem under an additional security constraint, which requires that each user's message be kept secure from the relay. We consider two types of security constraints: 1) perfect secrecy, in which the MAC channel output seen by the relay is independent of each user's message and 2) strong secrecy, which is a form of asymptotic independence. We propose a coding scheme based on nested lattices, the main feature of which is that given a pair of nested lattices that satisfy certain goodness properties, we can explicitly specify probability distributions for randomization at the encoders to achieve the desired security criteria. In particular, our coding scheme guarantees perfect or strong secrecy even in the absence of channel noise. The noise in the channel only affects reliability of computation at the relay, and for Gaussian noise, we derive achievable rates for reliable and secure computation. We also present an application of our methods to the multihop line network in which a source needs to transmit messages to a destination through a series of intermediate relays.
Resumo:
In this letter, we propose a scheme to improve the secrecy rate of cooperative networks using Analog Network Coding (ANC). ANC mixes the signals in the air; the desired signal is then separated out, from the mixed signals, at the legitimate receiver using techniques like self interference subtraction and signal nulling, thereby achieving better secrecy rates. Assuming global channel state information, memoryless adversaries and the decode-and-forward strategy, we seek to maximize the average secrecy rate between the source and the destination, subject to an overall power budget. Then, exploiting the structure of the optimization problem, we compute its optimal solution. Finally, we use numerical evaluations to compare our scheme with the conventional approaches.
Resumo:
We consider a continuum percolation model consisting of two types of nodes, namely legitimate and eavesdropper nodes, distributed according to independent Poisson point processes in R-2 of intensities lambda and lambda(E), respectively. A directed edge from one legitimate node A to another legitimate node B exists provided that the strength of the signal transmitted from node A that is received at node B is higher than that received at any eavesdropper node. The strength of the signal received at a node from a legitimate node depends not only on the distance between these nodes, but also on the location of the other legitimate nodes and an interference suppression parameter gamma. The graph is said to percolate when there exists an infinitely connected component. We show that for any finite intensity lambda(E) of eavesdropper nodes, there exists a critical intensity lambda(c) < infinity such that for all lambda > lambda(c) the graph percolates for sufficiently small values of the interference parameter. Furthermore, for the subcritical regime, we show that there exists a lambda(0) such that for all lambda < lambda(0) <= lambda(c) a suitable graph defined over eavesdropper node connections percolates that precludes percolation in the graphs formed by the legitimate nodes.
Resumo:
A routing protocol in a mobile ad hoc network (MANET) should be secure against both the outside attackers which do not hold valid security credentials and the inside attackers which are the compromised nodes in the network. The outside attackers can be prevented with the help of an efficient key management protocol and cryptography. However, to prevent inside attackers, it should be accompanied with an intrusion detection system (IDS). In this paper, we propose a novel secure routing with an integrated localized key management (SR-LKM) protocol, which is aimed to prevent both inside and outside attackers. The localized key management mechanism is not dependent on any routing protocol. Thus, unlike many other existing schemes, the protocol does not suffer from the key management - secure routing interdependency problem. The key management mechanism is lightweight as it optimizes the use of public key cryptography with the help of a novel neighbor based handshaking and Least Common Multiple (LCM) based broadcast key distribution mechanism. The protocol is storage scalable and its efficiency is confirmed by the results obtained from simulation experiments.
Resumo:
We consider information theoretic secret key (SK) agreement and secure function computation by multiple parties observing correlated data, with access to an interactive public communication channel. Our main result is an upper bound on the SK length, which is derived using a reduction of binary hypothesis testing to multiparty SK agreement. Building on this basic result, we derive new converses for multiparty SK agreement. Furthermore, we derive converse results for the oblivious transfer problem and the bit commitment problem by relating them to SK agreement. Finally, we derive a necessary condition for the feasibility of secure computation by trusted parties that seek to compute a function of their collective data, using an interactive public communication that by itself does not give away the value of the function. In many cases, we strengthen and improve upon previously known converse bounds. Our results are single-shot and use only the given joint distribution of the correlated observations. For the case when the correlated observations consist of independent and identically distributed (in time) sequences, we derive strong versions of previously known converses.
Resumo:
Clinical microscopy is a versatile diagnostic platform used for diagnosis of a multitude of diseases. In the recent past, many microfluidics based point-of-care diagnostic devices have been developed, which serve as alternatives to microscopy. However, these point-of-care devices are not as multi-functional and versatile as clinical microscopy. With the use of custom designed optics and microfluidics, we have developed a versatile microscopy-based cellular diagnostic platform, which can be used at the point of care. The microscopy platform presented here is capable of detecting infections of very low parasitemia level (in a very small quantity of sample), without the use of any additional computational hardware. Such a cost-effective and portable diagnostic device, would greatly impact the quality of health care available to people living in rural locations of the world. Apart from clinical diagnostics, it's applicability to field research in environmental microbiology has also been outlined. (C) 2015 Author(s). All article content, except where otherwise noted, is licensed under a Creative Commons Attribution 3.0 Unported License.
Resumo:
Polyelectrolyte multilayer (PEM) thin film composed of weak polyelectrolytes was designed by layer-by-layer (LbL) assembly of poly(allylamine hydrochloride) (PAH) and poly(methacrylic acid) (PMA) for multi-drug delivery applications. Environmental stimuli such as pH and ionic strength showed significant influence in changing the film morphology from pore-free smooth structure to porous structure and favored triggered release of loaded molecules. The film was successfully loaded with bovine serum albumin (BSA) and ciprofloxacin hydrochloride (CH) by modulating the porous polymeric network of the film. Release studies showed that the amount of release could be easily controlled by changing the environmental conditions such as pH and ionic strength. Sustained release of loaded molecules was observed up to 8 h. The fabricated films were found to be biocompatible with epithelial cells during in-vitro cell culture studies. PEM film reported here not only has the potential to be used as self-responding thin film platform for transdermal drug delivery, but also has the potential for further development in antimicrobial or anti-inflammatory coatings on implants and drug-releasing coatings for stents. (C) 2015 Elsevier B.V. All rights reserved.