- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Cloud Data Security Solutions
- Blockchain Technology Applications and Security
- Advanced Authentication Protocols Security
- Wireless Communication Security Techniques
- IPv6, Mobility, Handover, Networks, Security
- Advanced Malware Detection Techniques
- Web Application Security Vulnerabilities
- Information and Cyber Security
- Advanced Data Storage Technologies
Thammasat University
2023-2025
As for the advancement of IoT and cloud computing in healthcare, outsourcing encrypted Electronic medical records (EMRs) created by aggregation treatment applications health data collected from devices enables high accessibility, effective collaboration, zero computational operation cost. Current research works generally concern privacy finest EMRs that are with secure lightweight cryptographic protocols before they outsourced to cloud. However, this process does not consider security...
Cloud data warehouse (CDW) platforms have been offered by many cloud service providers to provide abundant storage and unlimited accessibility business users. Sensitive (DW) consisting of dimension fact is typically encrypted before it outsourced the cloud. However, query over DW not practically supported any analytical tools. The Searchable Encryption (SE) technique palpable for supporting keyword searches data. Although SE schemes introduced their own unique searching methods based on...
Achieving privacy-preserving analytical query with fine-grained access control for cloud-based data warehouse (CDW) through the use of online processing (OLAP) tool is a real challenge. This because must be enforced differently to multiple users while OLAP should excelled from encrypted DW and results are delivered public network. Existing solutions employ encryption apply on DW. However, they mostly overlooked enforcement different efficient performance when there large number users. In...
Existing access control schemes for IoT-Cloud-based settings generally focus on investigating the fine-grained featured with lightweight decryption. However, these requirements are not adequate sensitive and high volumes of data such as IoT healthcare that is outsourced in cloud. In this paper, we proposed a secure, fine-grained, batch-auditable scheme, supports both encryption decryption IoT-based electronic medical records (EMRs). Technically, our scheme fully offloads ciphertext-policy...
Implementing a cloud-based data warehouse to store sensitive or critical strategic presents challenges primarily related the security of stored information and exchange OLAP queries between cloud server users. Although encryption is viable solution for safeguarding outsourced data, applying it involving multidimensional measures, Multidimensional Expressions (MDX) operations on encrypted poses difficulties. Existing searchable solutions are inadequate handling such complex queries, which...
Penetration Testing (PenTest) is crucial to an organization's system security. It helps ensure the confidentiality, integrity, and availability of reduces exposures future risks. Specifically, PenTest process usually initiated after vulnerability assessment (VA) scanning where its results are used undertake PenTest. Significantly, requires expert testers test each found in VA stage thoroughly. Hence, expert-dependent time-consuming. To optimize set vulnerabilities be tested process, we...