Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








158 Hits in 5.9 sec

Data Security and Privacy Protection for Cloud Storage: A Survey

Pan Yang, Neal N. Xiong, Jingli Ren
2020 IEEE Access  
By providing data storage and management, cloud storage system becomes an indispensable part of the new era.  ...  The new development trends including Internet of Things (IoT), smart city, enterprises digital transformation and world's digital economy are at the top of the tide.  ...  With the technology from [65] , they achieve large universe construction, where the size of attributes is not limited and VOLUME 4, 2016 Directly revocable and verifiable keypolicy ABE scheme for large  ... 
doi:10.1109/access.2020.3009876 fatcat:6kcb3junlzhvvcq3qhztumpdqq

Leakage-resilient Attribute-based Encryption with CCA2 Security

Leyou Zhang, Yujie Shang
2019 International Journal of Network Security  
Leakage-resilient Attribute-Based Encryption (ABE) is one of efficient methods to solve the side-channel attacks.  ...  Based on this basic scheme, a λ-leakage resilient CCA2 secure ABE is proposed in the standard model.  ...  However, almost all of the existing leakage-resilient ABE schemes only achieve CPA security in this new setting.  ... 
dblp:journals/ijnsec/ZhangS19 fatcat:a7kqnu45tvav3eoqekfxct3faa

Towards a cryptography encyclopedia: a survey on attribute-based encryption

Thomas Prantl, Timo Zeck, Lukas Horn, Lukas ffländer, André Bauer, lexandra Dmitrienko, Christian Krupitzer, Samuel Kounev
2023 Journal of Surveillance, Security and Safety  
Access control, a key feature of digital business models, such as streaming, relies on the implementation of encryption schemes.  ...  In this survey, we create a sub-encyclopedia for attribute-based encryption (ABE) schemes.  ...  Availability of data and materials Not applicable.  ... 
doi:10.20517/jsss.2023.30 fatcat:sreleuvsivbznkt72sypgthym4

Revocable and Traceable Undeniable Attribute-Based Encryption in Cloud-Enabled E-Health Systems

Zhongxiang He, Yuling Chen, Yun Luo, Lingyun Zhang, Yingying Tang
2023 Entropy  
However, current CP-ABE schemes still face issues such as inflexible attribute revocation, relatively lower computational capabilities, and key management.  ...  MA-RUABE not only enables fast and accurate data traceability, effectively preventing malicious user key leakage, but also includes a direct revocation feature, significantly enhancing computational efficiency  ...  In contrast, indirect revocation can achieve finer-grained attribute revocation and offers greater flexibility. In 2011, Hur et al. [22] introduced an indirect revocation CP-ABE scheme.  ... 
doi:10.3390/e26010045 pmid:38248171 fatcat:w5jhl44nobgqvp6qvqzbegh3me

An Efficient Identity Based Encryption in Cloud Computing with Outsourced Revocation

U. Vijay Sankar, M. Pavithra, R Suganya
2020 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
Furthermore, we propose another construction which is provable secure under the recently formulized Refereed Delegation of Computation model.  ...  This goal is achieved by utilizing a novel collusion-resistant technique: we employ a hybrid private key for each user, in which an AND gate is involved to connect and bound the identity component and  ...  To achieve this goal, we present a security enhanced construction under the recently formalized Refereed Delegation of Computation (RDoC) model [7] .  ... 
doi:10.32628/cseit20668 fatcat:foc35bd6ofcw7l5sl72c4b2bcq

Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List [chapter]

Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang
2018 Lecture Notes in Computer Science  
In this paper, we propose an efficient revocable Ciphertext-Policy Attribute-Based Encryption (CP-ABE) scheme.  ...  We base on the direct revocation approach, by embedding the revocation list into ciphertext.  ...  of Shenzhen (JCYJ20160307150216309, JCYJ20170302151321095) and Tencent "Rhinoceros Birds" -Scientific Research Foundation for Young Teachers of Shenzhen University.  ... 
doi:10.1007/978-3-319-93387-0_27 fatcat:yfk6scejojdnrhbgubdxguincm

Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing

Jiawei Zhang, Jianfeng Ma, Teng Li, Qi Jiang, Athanasios V. Vasilakos
2021 Security and Communication Networks  
Moreover, we design a robust revocable mechanism to achieve direct user revocation in our scheme.  ...  To protect shared data against unauthorized accesses, many studies on Ciphertext-Policy Attribute-Based Encryption (CP-ABE) have been proposed to achieve data sharing granularity.  ...  To solve the problem, the scheme [21] proposed a leakage-resilience CP-HABE scheme by introducing continuous leakage-resilience mechanism into the CP-ABE scheme.  ... 
doi:10.1155/2021/6646445 fatcat:ojfrrk3azrcfjb3blzolcm2uei

SEA-BREW: A scalable Attribute-Based Encryption revocable scheme for low-bitrate IoT wireless networks

Michele La Manna, Pericle Perazzo, Gianluca Dini
2021 Journal of Information Security and Applications  
In contrast to state-of-the-art ABE schemes, ours is capable of securely performing key revocations with a single short broadcast message, instead of a number of unicast messages that is linear with the  ...  In this paper we propose a novel ABE scheme called SEA-BREW (Scalable and Efficient Abe with Broadcast REvocation for Wireless networks), which is suited for Internet of Things (IoT) and Industrial IoT  ...  Since the revocation is direct, the revocation list is embedded in the ciphertext, therefore achieving immediate key revocation.  ... 
doi:10.1016/j.jisa.2020.102692 fatcat:uww3incg2regjabfyxxflgc5ma

Secure Storing and Sharing of Cloud Data under Key Exposure: A Survey

Deepa Chandran P
2020 International Journal for Research in Applied Science and Engineering Technology  
An example of this can be cloud data storage where cloud service providers aren't within the identical trusted domains as end users, and hardware platforms aren't under the direct control of information  ...  key, will still compromise single server and rewrite the cipher text keep therein.  ...  In CP-ABE, revocation is not achieved efficiently.  ... 
doi:10.22214/ijraset.2020.6147 fatcat:mrtbesbypjazdh7icq6uwyrfjy

A Review of Functional Encryption in IoT Applications

Khurram Shahzad, Tanveer Zia, Emad-ul-Haq Qazi
2022 Sensors  
Functional encryption is an exciting new paradigm of public-key encryption that supports fine-grained access control, generalizing a range of existing fine-grained access control mechanisms.  ...  The Internet of Things (IoT) represents a growing aspect of how entities, including humans and organizations, are likely to connect with others in their public and private interactions.  ...  The protocol achieves inside keyword-guessing attacks (KGAs) resilience, forward privacy and file-injection attack resilience.  ... 
doi:10.3390/s22197567 pmid:36236664 pmcid:PMC9573314 fatcat:slcetffyzzfffdq4gav72yvfly

AACT: Anonymous and Accountable communication topology for Wireless Mesh Networks

M.Narasimha Rao
2012 IOSR Journal of Computer Engineering  
AACT is accessible as a suite of authentication and key agreement protocols built upon our AACT. Our analysis demonstrates that AACT is resilient to a number of security and privacy related attacks.  ...  Security and privacy issues are of the major concern in pushing the success of WMNs for their broad deployment and for behind service-oriented applications.  ...  Inter-region secure communication was achieved by using the concepts of public-key cryptography.This paper can serve as a platform for developing partially distributed system for practical scenarios as  ... 
doi:10.9790/0661-0520112 fatcat:wxrb53grjzdjrmbikh65wzm5iy

Secure-user sign-in authentication for IoT-based eHealth systems

B. D. Deebak, Fadi Al-Turjman
2021 Complex & Intelligent Systems  
However, most of the schemes are still persuasible to security threats, such as user-anonymity, privileged-insider, mutual authentication, and replay type of attacks.  ...  AbstractSustainable Computing has advanced the technological evolution of the Internet and information-based communication technology.  ...  Step 2 R S tries to determine ⟨U id , C NT ⟩ from the revocation table to compute C New NT = C NT + 1 and R new = E S (U id ∥ H New ∥ C New NT ) using a master secret-key m sk .  ... 
doi:10.1007/s40747-020-00231-7 fatcat:djrnwxkt7ngmfjlshxydtroasq

Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption

Taeho Jung, Xiang-Yang Li, Zhiguo Wan, Meng Wan
2015 IEEE Transactions on Information Forensics and Security  
AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semianonymity.  ...  Subsequently, we present the AnonyControl-F, which fully prevents the identity leakage and achieve the full anonymity.  ...  ACKNOWLEDGEMENTS The authors offer their gratitude to their colleague Jingshan Yin, who implemented the 1-out-of-n protocol, and Shih-ming Huang from NCTU, who proofread their paper to correct minor errors  ... 
doi:10.1109/tifs.2014.2368352 fatcat:rx3x4xn6ejfllevpx5wbi5invu

Prevention of Identity Leakage and Access Management Using Anony Control-F Attribute Based Encryption

Snehanka K. Patil
2018 International Journal for Research in Applied Science and Engineering Technology  
Anony management decentralizes the central authority to limit the identity run and so achieves semi anonymity.  ...  The protection analysis shows that each Anony management and Anony Control-F unit secure beneath the decisional linear Diffie-Hellman assumption, and new performance analysis exhibits the practicability  ...  key in one category, that's manner on top of the naive arrange higher than, and it isn't this paper's scope to ensure the truthful news of the attributes.  ... 
doi:10.22214/ijraset.2018.3157 fatcat:xqz7kof4ezay5gigzaztsfrcxe

Efficient Data Retrieval and Fine Grained Access Control on Secure Hybrid Cloud

2020 International Journal of Emerging Trends in Engineering Research  
Healthcare data has many private attributes to be secured from leakage due to inference either direct or indirect. Hybrid cloud is a model which is a combination of both private and public clouds.  ...  This model is proposed as a way of storing healthcare data. The data is carefully distributed between these two clouds to bring about security of private attributes.  ...  A two-fold advantage of reduction in communication cost and fine-grained access control is achieved by employing ABE method.  ... 
doi:10.30534/ijeter/2020/258102020 fatcat:3mqef23b7fc67pyzlzwrz3g22y
« Previous Showing results 1 — 15 out of 158 results