Filters








2,489 Hits in 4.3 sec

A Review on RSA Encryption Algorithm

Shaina Garg
2016 International Journal Of Engineering And Computer Science  
For an organization, it is very necessary to keep the information safe from various attackers.  ...  Strong encryption algorithms can be used to make it impossible for an attacker to attack the node that is strongly protected by multiple keys.  ...  [12] worked on hierarchical attribute based solution for flexible and scalable access control in cloud computing.  ... 
doi:10.18535/ijecs/v5i7.07 fatcat:6cvgarxgsvfjbazzdaf3572udm

RSA-DABE: A Novel Approach for Secure Health Data Sharing in Ubiquitous Computing Environment

P. Blessed Prince, K. Krishnamoorthy, R. Anandaraj, S. P. Jeno Lovesum
2015 Indian Journal of Science and Technology  
To enable a secure data sharing and access in a multi access ubiquitous environment, the proposed secured data sharing protocol enhances the attribute based encryption for distributed environment (DABE  ...  the attributes with the cryptographic parameters and keeps it under the control of attribute authority.  ...  Guojun Wang, Qin Liu, Jie Wu 3 , proposed a Hierarchical Attribute Based Encryption for fine-grained access control in cloud storage service.  ... 
doi:10.17485/ijst/2015/v8i17/69535 fatcat:kjkgcqbasnatnbpggx4botgz5y

An Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment Based on RSA Signature Assumption

Palanikkumar D
2012 Bonfring International Journal of Research in Communication Engineering  
Based on the RSA signature, a Trapdoor Commitment scheme is proposed to improve the security level.  ...  An efficient sharing of secure cloud storage services (ESC) scheme allows the users to share the messages in hierarchical order.  ...  A new type of encrypted access control is introduced in a system for Ciphertext-Policy Attribute Based Encryption by Bethencourt et al., [2] .  ... 
doi:10.9756/bijrce.1504 fatcat:naghlqgk3vblxaiuzq537mw23i

Survey on Providing Security and Authentication for Devices to Achieve QOS in IOT

2016 International Journal of Science and Research (IJSR)  
Instead of proposing yet another security scheme, this can be made easy if devices are identified before communication with secure routing  ...  The IOT (Internet of Things) is a network which connects things to the Internet for the intend of interchanging information through the information sensing devices with acceptable protocols.  ...  Yang, [6] to design an aggregated-proof based hierarchical authentication scheme for the layered networks.  ... 
doi:10.21275/v5i6.nov163142 fatcat:mrft3uaohfgkneuiqsyivyk724

Data Security for Outsourced Cloud Datausing HASBE Scheme and RSA Algorithm

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
., This anticipated system yield thin well-honed, mutable and ascendable statistics editing control by means of the manipulation of complex traits of Hierarchical (Ranked/Ordered) attribute-set-based encryption  ...  Prevailing RSA encryption does not endow the data with high security in health. To fulfill ascendable, elastic, and thin well-honed edit control of subcontracted statistics in cloud.  ...  Sasikala Data Security for Outsourced Cloud Datausing HASBE Scheme and RSA Algorithm Data Security for Outsourced Cloud Datausing HASBE Scheme and RSA Algorithm  ... 
doi:10.35940/ijitee.l1167.10812s19 fatcat:2drz3of7hjhwplmocczm7ms5zq

An Improved Security enabled Distribution of Protected Cloud Storage Services by Zero-Knowledge Proof based on RSA Assumption

M. Sowmyavarshini, D. Palanikkumar, G. Rathi
2012 International Journal of Computer Applications  
In hierarchical identity-based architecture, the sender needs to encrypt a file only once and store only one copy of the corresponding ciphertext in a cloud.  ...  In this paper, we propose a Trapdoor commitment scheme that enables a lower-level user to send a short trapdoor to the cloud service provider before retrieving files.  ...  A new type of encrypted access control is introduced in a system for Ciphertext-Policy Attribute Based Encryption by Bethencourt et al [2] .  ... 
doi:10.5120/4952-7198 fatcat:kuq73tbq4jg27nqprduiaih4p4

An Elliptic-Curve-Based Hierarchical Cluster Key Management in Wireless Sensor Network [chapter]

Srikanta Kumar Sahoo, Manmanth Narayan Sahoo
2013 Advances in Intelligent Systems and Computing  
In this paper we proposed an elliptic curve based hierarchical cluster key management scheme, which is very much secure, have better time complexity and consumes reasonable amount of energy.  ...  The proposed work uses digital signature scheme and encryptiondecryption mechanisms using elliptic curve cryptography(ECC).  ...  Related works Naureen et al. in [10] proposed performance and security assessment of a PKC based key management scheme for hierarchical sensor networks.  ... 
doi:10.1007/978-81-322-1665-0_38 fatcat:p7nf5hmb7zgujl6zbgxqes3j7y

A Survey on Contemporary MANET Security: Approaches for Securing the MANET

Rajan Patel, Pariza Kamboj
2017 International Journal of Engineering and Technology  
It also explored various IDS schemes as a second line of defence in MANET.  ...  The article explored various security solutions for routing protocols, data security using cryptography as a first line of defence, key management for securing communication.  ...  In this scheme, public key verification is performed by Media Access Control (MAC) function instead of RSA certificates. It saves storage space, bandwidth and computation power.  ... 
doi:10.21817/ijet/2017/v9i1/170901413 fatcat:kepeg6nwofcjjce6ubghravk4a

Securing Private Keys in Electronic Health Records Using Session-Based Hierarchical Key Encryption

Adebayo Omotosho, Justice Emuoyibofarhe, Alice Oke
2017 Journal of Applied Security Research  
The system development demonstrates one way patients' privacy and security can improve using sessionbased hierarchical key encryption system for EHR.  ...  Patients' generate a root keys using Blum Blum Shub Algorithm for pseudorandom number generator from which the session-based subkeys were derived, and only authorize users can access these records within  ...  Using hierarchy (Access Table ACCESS ) and Diffie-Hellman based key generation scheme, Zych, Petkovic, and Jonker (2008) presented a key management scheme for cryptographic enforcement of access control  ... 
doi:10.1080/19361610.2017.1354272 fatcat:63k3ttakfratleip4tobtrh75q

Performance Analysis of Multiple Keys used for Data Security

Hitesh Mittal, Ajay Kakkar
2014 International Journal of Computer Applications  
Secured and timely transmission of data is always an important aspect for an organization.  ...  The use of strong encryption algorithms almost make it impossible for a hacker to get access of node which is being protected by multiple keys.  ...  He describe the key access control models which were mandatory access control models and the role-based access control (RBAC) model. He also discussed security for advanced data management systems.  ... 
doi:10.5120/16664-6654 fatcat:jdunejzjnvfkbhu2czqqi4aqt4

Secure Data Sharing in Scalable Mobile Cloud Environment using HABE with Re-Encryption

B. SaranyaDevi, S. Shruthi, S. ThivyaRajeswari, P. Shanthi, A. Umamakeswari
2015 Indian Journal of Science and Technology  
For better security and scalability of sharing data over cloud from mobile devices, HABE along with Group Key mechanism is used.  ...  With this the data are stored securely in cloud and the system is scalable for group communication. To reduce computational overhead during revocation Proxy re-encryption technique is used.  ...  Hierarchical identity based an encryption scheme which is the generalization of IBE schemes that creates organizational hierarchy in generating user's identity 15 .  ... 
doi:10.17485/ijst/2015/v8is9/65590 fatcat:e74jv7n7zrbjlkht2a2xx4voym

Hierarchical Key Management Scheme for Securing Mobile Agents with Optimal Computation Time

P. Vijayakumar, K. Anand, S. Bose, V. Maheswari, R.Kowsalya, A. Kannan
2012 Procedia Engineering  
The Mobile agents are well suited for accessing contents of distributed web based applications including internet business.  ...  In this paper we propose a modified hierarchical date constrained key management scheme which potentially reduces the overall computation time needed for key derivation and key signature check operations  ...  Tzen-Long Chen proposed an efficient date-constraint hierarchical key management scheme for mobile agents [11] .  ... 
doi:10.1016/j.proeng.2012.06.177 fatcat:64hndpiqazawvo45h4m3s6xd3i

How to use attribute-based encryption to implement role-based access control in the cloud

Yan Zhu, Di Ma, Chang-Jun Hu, Dijiang Huang
2013 Proceedings of the 2013 international workshop on Security in cloud computing - Cloud Computing '13  
Furthermore, our solution provides a richer expressive power of access policies to facilitate flexible access control for ABE scheme.  ...  Based on these notations, we present a new ABE scheme called Attribute-Based Encryption with Attribute Lattice (ABE-AL) that provides an efficient approach to implement comparison operations between attribute  ...  For example, ABE is a more individualoriented access control system.  ... 
doi:10.1145/2484402.2484411 dblp:conf/ccs/0001MHH13 fatcat:3xvajioq3zf33k6wm7mfojzw44

Security Analysis in Hierarchical Resource Arrangements in Grid Computing

Author R.Menaka, R.S.D Wahidha Banu
2011 International Journal of Computer Applications  
Securing grid communication and controlling access to shared resources in a fine-tuned manner are important issues for grid services.  ...  As the days going on, desires of netizens increases to meet unforeseen emergency online demands for accessing the services, owning the resources for required period which exists in the e-pool distributive  ...  Sumathi, An Improved ID-Based Entitled Verifier Crytography for A bilinear pairing on (G1,GT ) is a map e : G1 *G2→ GT 2.1.1.  ... 
doi:10.5120/2947-3930 fatcat:vofon4ldqnb43ojecpixytsqvy

User-friendly and certificate-free grid security infrastructure

Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson, Geraint Price
2011 International Journal of Information Security  
In this paper, we propose a security infrastructure for grid applications, in which users are authenticated using passwords.  ...  Certificate-based public key infrastructures are currently widely used in computational grids to support security services.  ...  Subsequently, entities in PECF-GSI make use of a hierarchical identity-based encryption (HIBE) scheme and a hierarchical identity-based signature (HIBS) scheme when performing mutual authentication and  ... 
doi:10.1007/s10207-011-0123-8 fatcat:wap2vxremne2hhrz7sc4sel3aq
« Previous Showing results 1 — 15 out of 2,489 results