Filters








80,458 Hits in 4.8 sec

Elliptic Curve Cryptosystems-based Date-constrained Hierarchical Key Management Scheme in Internet of Things

Tsung-Chih Hsiao, Tzer-Long Chen, Tzer-Shyong Chen, Yu-Fang Chung
2019 Sensors and materials  
We also propose the date-constrained hierarchical key management scheme for mobile agents. With elliptic curve cryptosystems (ECCs) and discrete logarithms, the proposed scheme is flexible.  ...  environment access control functions.  ...  (8) introduced an ECC-based improved method for access control and key management. In 2009 and 2011, an improved version was raised by Jeng et al.'s scheme.  ... 
doi:10.18494/sam.2019.2085 fatcat:xkflf4dsize4lnc7ludlmnouma

Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent

Yu-Fang Chung, Tzer-Shyong Chen, Chia-Hui Liu, Tzu-Chi Wang
2008 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)  
This paper proposes a security scheme for mobile agents. The scheme includes access control and key management to ensure the security and confidentiality of information and the system.  ...  After examining the access control and key management scheme for mobile agents proposed by Volker and Mehrdad, the proposed scheme applies the concepts of polynomial interpolation formula, hierarchy structure  ...  This paper proposes a security scheme for mobile agents. The scheme includes access control and key management to ensure the security and confidentiality of information and the system.  ... 
doi:10.1109/waina.2008.112 dblp:conf/aina/ChungCLW08 fatcat:dtmgyxsvuzhjtkbq2zegosup34

Secure key management scheme for hierarchical access control based on ECC

Yu-Li Lina, Chien-Lung Hsu, Tzong-Chen Wu, So-Lin Yen, Chin-Lung Tseng
2009 43rd Annual 2009 International Carnahan Conference on Security Technology  
In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes.  ...  In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems.  ...  OVERVIEW OF JENG-WANG SCHEME Jeng and Wang proposed an efficient key management and derivation scheme based on the elliptic curve cryptosystem to solve the hierarchical access control problems [9] .  ... 
doi:10.1109/ccst.2009.5335515 fatcat:adu6o6tgqrfxlciilc5osogqpm

Hierarchical key management scheme using polynomial interpolation

Manik Lal Das, Ashutosh Saxena, Ved P. Gulati, Deepak B. Phatak
2005 ACM SIGOPS Operating Systems Review  
We present a hierarchical key management scheme using cryptographic hash function and Newton's polynomial interpolation for users key and system resources management.  ...  We show that our scheme is secure and efficient in comparisons to the Shen and Chen's scheme.  ...  From Table- V Conclusion We have proposed an efficient key management scheme to enforce access control policies in a hierarchical system.  ... 
doi:10.1145/1044552.1044556 fatcat:uorv4tiakbcf3is7kbfoe4oaci

A Survey on Hierarchical Attribute Set Based Encryption (HASBE) Access Control Model for Cloud Computing

Vanraj Kamliya, Rajnikanth Aluvalu
2015 Journal of Telematics and Informatics  
That's why the reason traditional access control is not enough For the High security .so that the attribute-based encryption (ABE) have been proposed for access control of outsourced data in cloud computing  ...  with the complex access control policy.in this paper, we have proposed hierarchical attribute-set-based encryption (HASBE) access control by extending cipher-text policy and attribute-set-based encryption  ...  That's help to improve the system performance as well as decreasing the complexity of the database. For security purpose, the proposed scheme consists of 3 keys: Private, Public and Master key.  ... 
doi:10.12928/jti.v3i1.22-27 fatcat:npbuzf63vrblrpymgqh2ttwcle

Securing Private Keys in Electronic Health Records Using Session-Based Hierarchical Key Encryption

Adebayo Omotosho, Justice Emuoyibofarhe, Alice Oke
2017 Journal of Applied Security Research  
The system development demonstrates one way patients' privacy and security can improve using sessionbased hierarchical key encryption system for EHR.  ...  In this article, a sessionbased hierarchical key encryption system was developed that allows patient to have full control over certain nodes of their health records.  ...  schemes, and hierarchical key management.  ... 
doi:10.1080/19361610.2017.1354272 fatcat:63k3ttakfratleip4tobtrh75q

Hierarchical group access control for secure multicast communications

Yan Sun, K.J. Ray Liu
2007 IEEE/ACM Transactions on Networking  
While most existing group key management schemes are designed for single level access control, we present a multi-group key management scheme that achieves hierarchical group access control.  ...  Compared with applying existing key management schemes directly to the hierarchical access control problem, the proposed scheme significantly reduces the overhead associated with key management and achieves  ...  Employing Independent Key Trees to Achieve Hierarchical Access Control One way to solve the hierarchical access control problem is to use the existing tree-based key management schemes.  ... 
doi:10.1109/tnet.2007.897955 fatcat:5a76wi7jkzfvvgwqiu26anuzke

Comparative Analysis of Compression Techniques and Feature Extraction for Implementing Medical Image Privacy Using Searchable Encryption [chapter]

J. Hyma, P. V. G. D. Prasad Reddy, A. Damodaram
2015 Advances in Intelligent Systems and Computing  
That's why the reason traditional access control is not enough For the High security .so that the attribute-based encryption (ABE) have been proposed for access control of outsourced data in cloud computing  ...  with the complex access control policy.in this paper, we have proposed hierarchical attribute-set-based encryption (HASBE) access control by extending cipher-text policy and attribute-set-based encryption  ...  That's help to improve the system performance as well as decreasing the complexity of the database. For security purpose, the proposed scheme consists of 3 keys: Private, Public and Master key.  ... 
doi:10.1007/978-3-319-13728-5_7 fatcat:eboezx4bfzantbrbfkab2rcsne

Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges and Solutions

Pan Jun Sun
2019 IEEE Access  
, searchable encryption(SE), trust, reputation, extension of tradition access control and hierarchical key; third, we propose the research challenge and future direction of the privacy protection in the  ...  In recent years, there are many research schemes of cloud computing privacy protection based on access control, attribute-based encryption (ABE), trust and reputation, but they are scattered and lack unified  ...  HIERARCHICAL KEY Hierarchical key is an important method of privacy protection.  ... 
doi:10.1109/access.2019.2946185 fatcat:tbg5a25f5rd3je4mogemegrvje

A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT

Xiaoyu Li, Min Ye, Jiahui Chen, Jianhui Chen, Yeh-Cheng Chen, Xingsi Xue
2021 Security and Communication Networks  
Hierarchical key assignment scheme is an efficient cryptographic method for hierarchical access control, in which the encryption keys of lower classes can be derived by the higher classes.  ...  In this paper, we propose a hierarchical key assignment scheme based on multilinear map to solve the multigroup access control in Internet of Things data markets.  ...  Hierarchical key assignment scheme is an efficient cryptographic method for hierarchical access control, in which the encryption keys of lower classes can be derived by the higher classes.  ... 
doi:10.1155/2021/6174506 fatcat:q2qn7o3yznbdfn45h6nw4qjrtm

A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing

X. Zou, Y.-S. Dai, E. Bertino
2008 IEEE INFOCOM 2008 - The 27th Conference on Computer Communications  
Addressing such challenges requires, among other things, developing techniques for Secure Group Communication (SGC), Secure Dynamic Conferencing (SDC), Differential Access Control (DIF-AC), and Hierarchical  ...  This paper proposes the first holistic group key management scheme which can directly support all these functions yet retain efficiency.  ...  Hierarchical key management for Hierarchical Access Control (HAC).  ... 
doi:10.1109/infocom.2008.102 dblp:conf/infocom/ZouDB08 fatcat:iuflmj4lmvguzmatw4lzp5cyjy

A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing

X. Zou, Y.-S. Dai, E. Bertino
2008 2008 Proceedings IEEE INFOCOM - The 27th Conference on Computer Communications  
Addressing such challenges requires, among other things, developing techniques for Secure Group Communication (SGC), Secure Dynamic Conferencing (SDC), Differential Access Control (DIF-AC), and Hierarchical  ...  This paper proposes the first holistic group key management scheme which can directly support all these functions yet retain efficiency.  ...  Hierarchical key management for Hierarchical Access Control (HAC).  ... 
doi:10.1109/infocom.2007.102 fatcat:twrjrbudmvfufb7liym3hfdvme

Privacy-Oriented Blockchain-based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario

Mingxin Ma, Guozhen Shi, Fenghua Li
2019 IEEE Access  
for hierarchical access control in IoT.  ...  The rapid development of the Internet of Things (IoT) and the explosive growth of valuable data produced by user equipment have led to strong demand for access control, especially hierarchical access control  ...  management function for hierarchical access control, multi-SAMs are used in our proposed scheme.  ... 
doi:10.1109/access.2019.2904042 fatcat:rruio6scvfbwjnkbo4ttt56i4y

Anonymous Electronic Health Record Sharing Scheme Based on Decentralized Hierarchical Attribute-based encryption in Cloud Environment

Xueyan Liu, Xiaotao Yang, Yukun Luo, Li Wang, Qiang Zhang
2020 IEEE Access  
ACKNOWLEDGMENT The authors wish to thank the anonymous referees for their patience in reading this manuscript and heir invaluable comments and suggestions.  ...  [36] proposed a hierarchical attribute-based solution for flexible and scalable access control in cloud computing.  ...  For a singleauthority ABE schemes, a trusted central authority (CA) is responsible for managing all attributes and distributing secret keys for all users.  ... 
doi:10.1109/access.2020.3035468 fatcat:jaqp6injcbcr7jweoalegdq35i

Attribute-based Encryption for Electronic Health Records in a Cloud Computing Environment

Emmanuel Kusi Achampong, Clement Dzidonu
2015 International Journal of Cloud-Computing and Super-Computing  
Attribute-based encryption schemes have the potential to minimise communication cost of the Internet, and also provide a fine-grained access control system for EHR in a cloud computing environment.  ...  In this paper, an analysis of ABE systems is discussed with their types (CP-ABE, KP-ABE, HABE and DABE) and suggestions are given for their improvement for EHR in a cloud computing environment.  ...  The HABE scheme uses properties of hierarchical identity-based encryption (HIBE) scheme in the generation of keys. Also, it uses disjunctive normal form (DNF) to show the access control policy.  ... 
doi:10.21742/ijcs.2015.2.2.01 fatcat:5n3jcceifjfabfkxs35yn2whhm
« Previous Showing results 1 — 15 out of 80,458 results