1,837 Hits in 6.9 sec

IoT device security based on proxy re-encryption

SuHyun Kim, ImYeong Lee
2017 Journal of Ambient Intelligence and Humanized Computing  
This method implements proxy re-encryption in order to manage data with fewer encryptions, and provides a data sharing function to supplement the insufficient capacity of lightweight device networks.  ...  It appears that interest in the Internet of things (IoT) has recently reached its peak, with a great deal of focus from both the private and public sectors.  ...  , and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.  ... 
doi:10.1007/s12652-017-0602-5 fatcat:t6jmdy3pxrd7lbbx4ieehwmdku

Proxy Re-encryption Schemes for Secure Cloud Data and Applications: A Survey

Raghi Roy, Paul P.
2017 International Journal of Computer Applications  
This paper presents a survey on Proxy re-encryption techniques with respect to secure cloud data and its application.  ...  privacy, robustness and access control.In this paper the proxy re-encryption(PRE) schemes, Conditional PRE,Identity based PRE and Broadcast PRE,Type based PRE, Key private PRE,Attribute based PRE,Threshold  ...  Attribute Based PRE In attribute based proxy re-encryption scheme [16] , a semi trusted proxy with some additional information can transform a ciphertext under a set of attributes into a new ciphertext  ... 
doi:10.5120/ijca2017913642 fatcat:ebvslla3v5du5bzytodxwpygsm

A Comparative Study on Privacy Preserving Schemes based on Encryption Proxy and Cloud Mask

Umar Khalid Farooqui
2018 International Journal for Research in Applied Science and Engineering Technology  
In this paper we made an attempt to present a comparative study on two such popular privacy preservation schemes, namely -Encryption Proxy and Cloud Masked model for secure data storage on cloud  ...  which is outsourced(whether on rest or transmit)needs protection, In this regard various researchers proposed different schemes and models based on Cryptographic mechanism, proxy based service models.  ...  In cloud mask on the event of group dynamics change entire file requires to re-encrypt this gives additional computational burden and in proxy based model encryption proxy control access given to the users  ... 
doi:10.22214/ijraset.2018.3064 fatcat:5lormrrnazbwpgf2tuf6limtfi

Security and Privacy-preserving Challenges of e-Health Solutions in Cloud Computing

Shekha Chenthara, Khandakar Ahmed, Hua Wang, Frank Whittaker
2019 IEEE Access  
records (EHRs) in the cloud.  ...  We carry an intensive study in the IEEE, Science Direct, Google Scholar, PubMed, and ACM for papers on EHR approach published between 2000 and 2018 and summarized them in terms of the architecture types  ...  This approach [54] instigates hierarchical attribute based encryption with a keyword search scheme that ensures confidentiality of EHRs in the cloud environment.  ... 
doi:10.1109/access.2019.2919982 fatcat:3sawv3nb5ndnncdzzk5q2anuwq

Secure Data Sharing using Proxy Re-Encryption for Intelligent Customized Services

Hyun-Jong Cha, Ho-Kyung Yang, You-Jin Song
2018 International Journal of Grid and Distributed Computing  
In response, this study proposed a re-encryption technique for managing data securely in the fog computing environment.  ...  This technique allows a user to delegate the decryption authority to decrypt encrypted data using the re-encryption method in the proxy server for efficient communication.  ...  In the future, it is our plan to compare the aspects of efficiency through implementation and to study the attribute-based proxy re-encryption scheme, which delegates decryption rights according to attributes  ... 
doi:10.14257/ijgdc.2018.11.10.03 fatcat:7abshqmojvfprebpgakaqy4i3i

SAML based context aware IDM a fine-grained proxy re-encryption approach to improve the privacy of users identity data in cloud environment

T S Srinivasa Reddy Modugula, B Vijaya Babu, Sunitha Pachala, Rupa Chiramdasu, L Sumalatha
2018 International Journal of Engineering & Technology  
In this paper, we propose a SAML based ContextawareIdM, a model for fine-grained privacy-preserving identity as a service which employs Identity-based conditional proxy re-encryption to maintain and operate  ...  Cloud computing has made tremendous changes in IT industry by offering various services ranging from Iaas, Saas, Paas, Daas, IDaas to Xaas i.e. everything as a service.  ...  [13] have proposed hierarchical attribute based proxy re-encryption that is extended using key policy attribute-based encryption technique for user revocation and securing data in the cloud.  ... 
doi:10.14419/ijet.v7i2.7.10274 fatcat:nvvcmikosjcmtnf2s6stdlhqaa

Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges and Solutions

Pan Jun Sun
2019 IEEE Access  
In recent years, there are many research schemes of cloud computing privacy protection based on access control, attribute-based encryption (ABE), trust and reputation, but they are scattered and lack unified  ...  encryption), CP-ABE (ciphertext policy attribute-based encryption), access structure, revocation mechanism, multiauthority, fine-grained, trace mechanism, proxy re-encryption(PRE), hierarchical encryption  ...  PROXY RE-ENCRYPTION (PRE) The attribute-based proxy re-encryption (ABPRE) scheme combines the traditional proxy re-encryption with ABE, and the user can decrypt the re-encrypted ciphertext with the associated  ... 
doi:10.1109/access.2019.2946185 fatcat:tbg5a25f5rd3je4mogemegrvje

Review on dynamic group data sharing in cloud environment

Sathishkumar Easwaramoorthy, Anilkumar Chunduru, Usha Moorthy, Sravankumar B
2018 International Journal of Engineering & Technology  
Information sharing or exchange of data within entities plays a significant role in cloud storage.  ...  Assuring privacy in data sharing is still a critical issue due to continuous change in cloud users, particularly, for unauthenticated or third party users because of the risk of collusion attacks.  ...  Studies related to attribute-based encryption Attribute-Based Encryption (ABE) is a powerful technique used to provide fine-grained access control to data stored in the Cloud.  ... 
doi:10.14419/ijet.v7i2.9770 fatcat:st6pdtpskncghiidbpinvzltja

Some Studies on Protection for the Hidden Attribute Based Signatures without Anonymity Revocation

S. Mahathi, M. Ravindar
2018 International Journal of Trend in Scientific Research and Development  
The purpose of this paper is to study of access control scheme to protect users' privacy in cloud environment is of great significance.  ...  For the users of PUD, a hierarchical attribute-based encryption is applied to avoid the issues of single point of failure and complicated key distribution.  ...  In this paper, we propose access control system (PS-ACS), which is privilege separation based on privacy the analysis of cloud environment and the characteristics of the user, we divide the users into  ... 
doi:10.31142/ijtsrd18575 fatcat:ohqqzgczzffv3easc67yut7m74

A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch

Liming Fang, Minghui Li, Lu Zhou, Hanyi Zhang, Chunpeng Ge
2019 Sensors  
The core policy of FPAS is two-fold: (1) utilizing a homomorphic and re-encrypted scheme to ensure that the ciphertext information can be correctly calculated; (2) dividing the data requester by different  ...  A smart watch is a kind of emerging wearable device in the Internet of Things. The security and privacy problems are the main obstacles that hinder the wide deployment of smart watches.  ...  attribute-based encryption QR code Quick response code  ... 
doi:10.3390/s19092109 fatcat:v35k5o5hirdhzfigsj6dcmmco4

Analysis of attribute-based cryptographic techniques and their application to protect cloud services

Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh
2019 Transactions on Emerging Telecommunications Technologies  
In addition, we explore the limitations of existing attribute based cryptographic mechanisms and propose future research directions to better fit the growing needs of this cloud environment in terms of  ...  In this paper, we provide a comparative analysis of different attribute based cryptographic mechanisms suitable for cloud data sharing services. we also provide a detailed discussion of different reviewed  ...  revocable attribute based encryption scheme, called DACC, for cloud environments.  ... 
doi:10.1002/ett.3667 fatcat:eu7rs5halbefrmbiipbf6t7c7e

Multi-security-level cloud storage system based on improved proxy re-encryption

Jinan Shen, Xuejian Deng, Zhenwu Xu
2019 EURASIP Journal on Wireless Communications and Networking  
Based on the characteristics and data security requirements of the cloud environment, we present a scheme for a multi-security-level cloud storage system that is combined with AES symmetric encryption  ...  and an improved identity-based proxy re-encryption (PRE) algorithm.  ...  Acknowledgements We thank Puming Wang for feedback on the initial versions of this paper.  ... 
doi:10.1186/s13638-019-1614-y fatcat:p6r4g2qa5fgrli3ii2g72uooj4

Improved Searchable Encryption via Conglomerate Keys in Federated Cloud Storage

G. Kavitha, R. Priya
2016 Indian Journal of Science and Technology  
Owing to adversaries, a promising approach using conglomerate keys invents as a better searchable encryption schemes in multiowner applications.  ...  Applications/ Improvements: This method can also be extended to the hybrid architecture like Indexing schemes, Re-encryption schemes etc.  ...  The most renowned schemes are the Attribute Based Encryption, Ciphertext policy based Attribute Based Encryption, Key Policy based Attribute Based Encryption, Proxy Re-encryption etc.  ... 
doi:10.17485/ijst/2016/v9i42/97522 fatcat:tgtj7uffh5bwzpyign7qyb5cse

Data Security in Mobile Cloud Computing: A State of the Art Review

Rida Qayyum, Department of Computer Science, Government College Women University Sialkot, Pakistan
2020 International Journal of Modern Education and Computer Science  
However, the primary focus of this study is to analyze how to secure the user's data in a mobile cloud.  ...  Leading to objectives, the current study presents a comprehensive analysis of existing techniques that can be considered for securing data in MCC efficiently.  ...  A proxy-assisted technique utilizing the benefits of attribute-based encryption scheme is proposed by Yang et al (2015) .  ... 
doi:10.5815/ijmecs.2020.02.04 fatcat:yujvu3jzrndf7jaws6dahrk3ci

Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing

Asma Alotaibi, Ahmed Barnawi, Mohammed Buhari
2017 Journal of Information Security  
Keeping these issues in mind, we will secure data sharing in fog computing by combining attributebased encryption and proxy re-encryption techniques.  ...  In this paper, we present a novel architecture for data sharing in a fog environment. We explore the benefits of fog computing in addressing one-to-many data sharing applications.  ...  Our proposed framework rests on a combination of previous approaches that provide secure data sharing in cloud computing, such as Attribute-Based Encryption (ABE) and Proxy Re-Encryption (PRE) techniques  ... 
doi:10.4236/jis.2017.83014 fatcat:r4vcotkvujf5pdzks4iyx5lhem
« Previous Showing results 1 — 15 out of 1,837 results