1,661 Hits in 4.3 sec

A Secure Enhanced Key-Policy Attribute-Based Temporary Keyword Search Scheme in the Cloud

Kai Zhang, Ximeng Liu, Yanping Li, Tao Zhang, Shuhua Yang
2020 IEEE Access  
A key-policy attribute-based temporary keyword search scheme is selectively secure against chosenkeyword attack if all polynomial time adversaries have at most a negligible advantage in the above security  ...  [1] presented the primitive of key-policy attribute-based temporary keyword search (KP-ABTKS) in which the search token can only be used in a time interval rather than any time.  ...  TAO ZHANG received the M.S. and Ph.D. degrees in computer science from Xidian University, Xi'an, China, in 2011 and 2015, respectively.  ... 
doi:10.1109/access.2020.3007179 fatcat:7gm3lxohcbhize4sae42lltx6i

An efficient PHR service system supporting fuzzy keyword search and fine-grained access control

Fatos Xhafa, Jianfeng Wang, Xiaofeng Chen, Joseph K. Liu, Jin Li, Paul Krause
2013 Soft Computing - A Fusion of Foundations, Methodologies and Applications  
We propose a novel PHR service system which supports efficient searching and fine-grained access control for PHR data in a hybrid cloud environment, where a private cloud is used to assist the user to  ...  In our proposed solution, we make use of attribute-based encryption (ABE) technique to obtain finegrained access control for PHR data.  ...  Acknowledgement We are grateful to the anonymous referees for their invaluable suggestions.  ... 
doi:10.1007/s00500-013-1202-8 fatcat:hpvbno2dhjdvdehzvypmr6p5fy

Secure and Efficient Data Retrieval of Data from Cloud with Effective Deduplication Scheme

Mr. Salithkumar. P
2021 International Journal for Research in Applied Science and Engineering Technology  
In the attribute-based keyword search (ABKS) schemes, the authorized users can generate searching time and send them to the cloud for running the search operation.  ...  Temporary keyword search on confidential data in a cloud environment is the main focus of this research. The cloud providers are not fully trusted.  ...  Introduction A novel notion Key-Policy Attribute-Based Temporary Keyword Search (KP-ABTKS).  ... 
doi:10.22214/ijraset.2021.33609 fatcat:rpkklrn7tzdqtirapjneskpxee

Security and Privacy-preserving Challenges of e-Health Solutions in Cloud Computing

Shekha Chenthara, Khandakar Ahmed, Hua Wang, Frank Whittaker
2019 IEEE Access  
records (EHRs) in the cloud.  ...  This paper highlights the research challenges and directions concerning cyber security to build a comprehensive security model for EHR.  ...  ACKNOWLEDGMENT The authors would like to thank Prof. Yuan Miao and Dr. Hui Cui for their valuable comments, suggestions and reviews.  ... 
doi:10.1109/access.2019.2919982 fatcat:3sawv3nb5ndnncdzzk5q2anuwq

Integration of Hierarchical Access Control and Keyword Search Encryption in Cloud Computing Environment

Chih Hung Wang, Chia-Chun Hsu
2013 International Journal of Computer and Communication Engineering  
The proposed approach combines the fine-grained access control and keyword search encryption to provide multiple users' access controls in the cloud environment with encrypted data protection.  ...  Index Terms-Cloud computing, keyword search encryption, hidden vector encryption, fine-grained access control.  ...  Thus, there are two major policies of fine-grained access control system, ciphertext-policy attribute-based encryption and key-policy attribute-based encryption.  ... 
doi:10.7763/ijcce.2013.v2.199 fatcat:4yfu6gldyrcc3h3wimfxlwsjhe

Access Control in Fog Computing: Challenges and Research Agenda

Mohammed Aleisa, Abdullah Abuhussein, Frederick T. Sheldon
2020 IEEE Access  
As a result, new forms of security and privacy threats are emerging.  ...  The selection of AC models for cloud-based IoT environments is highly dependent on the application requirements and how the AC models can impact the computation overhead.  ...  For example, one paper introduced a scheme that uses CP-ABE and search-based keywords and deployed it in the fog using multiple attribute authorities.  ... 
doi:10.1109/access.2020.2992460 fatcat:ksl7yrz3anac7kyjyv3s7hvwiq

Secure Multi-Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks

Yong Ding, Hui Xu, Yujue Wang, Fang Yuan, Hai Liang, Shui Yu
2021 Security and Communication Networks  
implements encrypted EHRs access control under the ciphertext-policy attribute-based encryption (CP-ABE).  ...  To share encrypted EHRs with users effectively, help users retrieve EHRs accurately, and ensure EHRs confidentiality, a secure multi‐keyword search and access control (SMKS-AC) scheme is proposed, which  ...  [20] proposed a temporary and fuzzy keyword search public key encryption scheme, which can resist keyword guessing attacks and limit data retrieval time, thus enhancing the security of keyword search  ... 
doi:10.1155/2021/9520941 fatcat:7jdz6llbivf4zbuj3uuasmotdy

Integrated, Reliable and Cloud-Based Personal Health Record : A Scoping Review

Jesus Romero, Pablo Lopez, Jose Luis Vazquez Noguera, Cristian Cappo, Diego P. Pinto-Roa, Cynthia Villalba
2016 Health Informatics - An International Journal  
Information reliability is based in ABE security-privacy mechanism. Cloud-based technology access is achieved via SOA.  ...  Access to PHR sensitive information must comply with privacy policies defined by the patient. Architecture PHR design should be in accordance to these, and take advantage of nowadays technology.  ...  In [47] , the authors propose a Secure Channel Free Public-Key Encryption with Keyword Search (SCF-PEKS), which enables users to perform private searches for matching keywords over encrypted data without  ... 
doi:10.5121/hiij.2016.5301 fatcat:ppp33rdax5f3fhohrhhm4ua4ja

A Homomorphic Encryption Technique for Scalable and Secure Sharing of Personal Health Record in Cloud Computing

Soubhagya B, Venifa Mini G, Jeya A. Celin J
2013 International Journal of Computer Applications  
For secure data outsourcing, the users are divided in the PHR system into multiple security domains that greatly reduces the key management for owners and users.  ...  In the proposed work, a novel patient centric framework and a mechanism for data access control to PHRs stored in semi structured servers.  ...  Based on checking for user's attributes, every user obtain search capabilities under the authorization of local trusted authorities (LTAs). A user can search over an encrypted PHR using this method.  ... 
doi:10.5120/11443-7344 fatcat:kldyjtaarzhuxjq36go6dr5kwy

An Efficient Attribute-Based Multi-Keyword Search Scheme in Encrypted Keyword Generation

Yuanbo Cui, Fei Gao, Yijie Shi, Wei Yin, Emmanouil Panaousis, Kaitai Liang
2020 IEEE Access  
In this work, we consider a secure search service providing fine-grained and search functionality, called attribute-based multiple keyword search (ABMKS), which can be seen as an extension of searchable  ...  As a result, the computation cost of the encrypted keyword index generation is more efficient than the existing schemes.  ...  The authors declare that there are no conflicts of interest regarding the publication of this article.  ... 
doi:10.1109/access.2020.2996940 fatcat:zy4dkeoft5hulkwgxoqrinny5e

Security and Privacy in the Medical Internet of Things: A Review

Wencheng Sun, Zhiping Cai, Yangyang Li, Fang Liu, Shengqun Fang, Guoyan Wang
2018 Security and Communication Networks  
The security and privacy of the data collected from MIoT devices, either during their transmission to a cloud or while stored in a cloud, are major unsolved concerns.  ...  This paper focuses on the security and privacy requirements related to data flow in MIoT.  ...  Acknowledgments The authors would like to acknowledge the financial support from the National Natural Science Foundation of China (no. 61379145) and the Joint Funds of CETC (Grant no. 20166141B08020101  ... 
doi:10.1155/2018/5978636 fatcat:odfuofjixnf25cdi7haxinhyny

Internet of Cloud: Security and Privacy issues [article]

Allan Cook, Michael Robinson, Mohamed Amine Ferrag, Leandros A. Maglaras, Ying He, Kevin Jones, Helge Janicke
2017 arXiv   pre-print
The synergy between the cloud and the IoT has emerged largely due to the cloud having attributes which directly benefit the IoT and enable its continued growth.  ...  In this book chapter, we pursue two main goals: 1) to analyse the different components of Cloud computing and the IoT and 2) to present security and privacy problems that these systems face.  ...  [83] proposed two secure search schemes, namely, 1) the basic dynamic multi-keyword ranked search scheme in the known ciphertext model, and 2) the enhanced dynamic multi-keyword ranked search scheme  ... 
arXiv:1711.00525v1 fatcat:jlwxjo6jrnbzfjpelriqv6oa5m

A Comprehensive Survey on Security and Privacy for Electronic Health Data

Se-Ra Oh, Young-Duk Seo, Euijong Lee, Young-Gab Kim
2021 International Journal of Environmental Research and Public Health  
Based on the review, we obtained research taxonomy, security concerns, requirements, solutions, research trends, and open challenges for the components with strengths and weaknesses of the analyzed studies  ...  In particular, edge and fog computing studies for e-health security and privacy were reviewed since the studies had mostly not been analyzed in other survey papers.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/ijerph18189668 pmid:34574593 fatcat:nx7rjvy7tfczjbgmmpqgyiajuu

DNA Based Cloud Storage Security Framework Using Fuzzy Decision Making Technique

2019 KSII Transactions on Internet and Information Systems  
In recent years, a cloud environment with the ability to detect illegal behaviours along with a secured data storage capability is much needed.  ...  This study presents a cloud storage framework, wherein a 128-bit encryption key has been generated by combining deoxyribonucleic acid (DNA) cryptography and the Hill Cipher algorithm to make the framework  ...  After generating the session key, the data owner sends it to the corresponding user and notifies the CSP by sharing the temporary secret key K temp using a secure key-sharing scheme.  ... 
doi:10.3837/tiis.2019.07.025 fatcat:zgeakhmjrrd5zcykudghb4xqyu

A survey on design and implementation of protected searchable data in the cloud

Rafael Dowsley, Antonis Michalas, Matthias Nagel, Nicolae Paladi
2017 Computer Science Review  
existing scheme and implemented it to review its practical maturity for deployment in real systems.  ...  The survey of the field, together with the analysis and with the extensive experimental results provides a comprehensive review of the theoretical and practical aspects of searchable encryption.  ...  In order to perform a search for the keyword w the search token τ s (w) is x = E(w) and the key k generated from x .  ... 
doi:10.1016/j.cosrev.2017.08.001 fatcat:oxyuwk2luzc7vdkul4atqgkei4
« Previous Showing results 1 — 15 out of 1,661 results