A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
CSP and anonymity
[chapter]
1996
Lecture Notes in Computer Science
I t proposes a de nition of anonymity within the CSP notation, discusses the approach taken by CSP to anonymity with respect to di erent viewpoints, and illustrates this approach on some toy examples, ...
and then applies it to a machine-assisted analysis of the dining cryptographers example and some variants. ...
Acknowledgements Thanks are due to Peter Ryan for posing the dining cryptographers as a challenge for anonymity, and for his comments to Birgit P tzmann for a thorough reading and detailed comments and ...
doi:10.1007/3-540-61770-1_38
fatcat:q5yx2aj2m5hgrpg47iycnlo2za
Privacy-preserving security solution for cloud services
2015
Journal of Applied Research and Technology
Our solution is based on an efficient nonbilinear group signature scheme providing the anonymous access to cloud services and shared storage servers. ...
However, if a user breaks provider's rules, his access right is revoked.Our solution provides anonymous access, unlinkability and the confidentiality of transmitted data. ...
Acknowledgments This research work is funded by project SIX CZ.1.05/2.1.00/03.0072; the Technology Agency of the Czech Republic projects TA02011260 and TA03010818; the Ministry of Industry and Trade of ...
doi:10.1016/s1665-6423(15)30002-x
fatcat:zfxcb67cuzduvphn5b5xu4bv44
SAPPHIRE: Anonymity for enhanced control and private collaboration in healthcare clouds
2012
4th IEEE International Conference on Cloud Computing Technology and Science Proceedings
To realize the paradigm shift, it is necessary to provide anonymity in data storage and separate the administration of access policy and authorization from the mechanisms used for enforcement. ...
Our analysis shows that SAPPHIRE is a viable extension of collaborative health information systems through the provision of anonymity and enhanced policy administration for the primary data owner. ...
Anonymous PHR Submission between Bob and the CSP using Exchange to port message traffic between secure channels. ...
doi:10.1109/cloudcom.2012.6427488
dblp:conf/cloudcom/PecarinaPL12
fatcat:l3omsvzbk5eo7ocsusssa4cbxu
Constrained obfuscation of relational databases
2014
Information Sciences
and anonymization of social networks. ...
Finally, we evaluate the new method in terms of privacy, utility and execution time. ...
The two dependent CSPs: CSP 5 and CSP 6 and the two dependent CSPs: CSP 7 and CSP 8 are solved iteratively. Note that the age attribute is copied from T at stage 1 and is not modified later. ...
doi:10.1016/j.ins.2014.07.009
fatcat:zxcfs3jvz5hndgvyla7mderivm
A Brief Survey on Various Technologies Involved in Cloud Computing Security
2020
Asian journal of applied science and technology
Transparency Anonymisation is fully transparent: no metadata or key information has to be stored on the anonymized data by a proxy and the CSP will work on it as if it were an original data. ...
However, the core materials are also managed by the CSP in these systems, and the protection of the outsourced data relies on the trusting relationship between consumers and the CSP. ...
doi:10.38177/ajast.2020.4316
fatcat:upcqppapsnezvahckbwdw5345e
A Reputation-Based Identity Management Model for Cloud Computing
2015
Mathematical Problems in Engineering
Analysis verifies that the model can ensure that users access cloud services anonymously and that cloud providers assess the credibility of users effectively without violating user privacy. ...
To solve these problems, we introduce a reputation mechanism and design a reputation-based identity management model for cloud computing. ...
Also, we assume that the IdP and CSP can collude together to compromise anonymity. These assumptions comply with the actual situation, for the IdP and CSP may belong to the same institution. ...
doi:10.1155/2015/238245
fatcat:4oxog2xw2re2tl5mvjiyfjuzwq
Cooperative Query Answer Authentication Scheme Over Anonymous Sensing Data
2017
IEEE Access
Thus in some specific application scenarios, the DO is also called as the anonymous data provider. • The CSP provides the paid service for users. ...
But the cloud service providers (CSP) are often untrustworthy. The privacy and security concerns emerge over the authenticity of the query answer and the leakage of the DO identity. ...
the CSP and the user. ...
doi:10.1109/access.2017.2676008
fatcat:pduaywxl3fhxlloo6zsdossao4
Formal Analyze of a Private Access Control Protocol to a Cloud Storage
2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications
We clarify several ambiguities in the design of this protocol and model the protocol and its security properties with ProVerif an automatic tool for the verification of cryptographic protocols. ...
We propose a correction, and automatically prove the security of the corrected protocol with ProVerif. * Our ProVerif codes are avaible under request via the PC and will be publicly available if the paper ...
' attributes, and a CSP. ...
doi:10.5220/0006461604950500
dblp:conf/secrypt/Berrima0GR17
fatcat:e2nb4hlnofg3teeelru5p4bt2m
Location Data and COVID-19 Contact Tracing: How Data Privacy Regulations and Cell Service Providers Work In Tandem
[article]
2021
arXiv
pre-print
Accordingly, it might be speculated that CSPs collect information violating the privacy policies such as GDPR, CCPA, and others. ...
We found that three of the regulations (GDPR, COPPA, and CCPA) analyzed defined mobile location data as private information, and two (T-Mobile US, Boost Mobile) of the five CSPs that were analyzed did ...
ACKNOWLEDGMENTS We would like to acknowledge the Security and Privacy Research Lab at the University of Denver and the students of the COMP 3705/4705 : Adv Topics: Human-Centered Data Security and Privacy ...
arXiv:2103.14155v2
fatcat:3woqfkjxbnhn3g5wkuchqilkfu
A Privacy-Preserving Personalized Service Framework through Bayesian Game in Social IoT
2020
Wireless Communications and Mobile Computing
These classification results facilitate trustworthy cloud service providers (CSPs) in providing users with corresponding levels of services. ...
Furthermore, the CSP makes a strategic choice with the goal of maximizing reputation through playing a decision-making game with potential adversaries. ...
Xie and Zheng [31] proposed a differential social network anonymous algorithm satisfying k-anonymity and l-diversity. ...
doi:10.1155/2020/8891889
fatcat:x6cfsnmu5jfs7bxh4qqym2ktxa
Comments on "ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes"
2021
IEEE Access
Thus, ALAM scheme cannot ensure user anonymity and mutual authentication. ...
After that, CT generates a random nonce C n and computes CSP M ID = h(U ID ||M ID ||C n ) and SID u = E kuc (U ID , M ID , CSP M ID , T F seq ). ...
doi:10.1109/access.2021.3068723
fatcat:bk6us2iyfjeivm5kmuaoptrrti
ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids
2021
IEEE Access
SM's anonymity. ...
Hence, ARAP-SG ensure the anonymity and untraceablity features.
5) Anonymity and Untraceablity
Suppose that
6) SM Capture Attack After capturing SM y deployed in SG environment, A can extricate the ...
He is a member of an editorial board, a guest editor, and acts as a reviewer for various journals and conferences as well. ...
doi:10.1109/access.2021.3121291
fatcat:tjcqazmk3zguvltl4nu5lvsl3u
PRIVACY PRESERVING LOCATION BASED SERVICES QUERY SCHEME BASED ON FULLY HOMOMORPHIC ENCRYPTION
2021
Zenodo
the LBSP and cloud Server Provider (CSP). ...
The results prove the feasibility and efficiency of PPQ_FHE scheme in terms of query's response time, query accuracy, throughput and query overhead. ...
Also, there are no CSP computation complexities for K-anonymity, PCQP and LPCQP because there is no data outsourcing to cloud. ...
doi:10.5281/zenodo.5393261
fatcat:a3leinfljzcbfcx36wt37uu6s4
Secure and Privacy-Preserving Physical-Layer-Assisted Scheme for EV Dynamic Charging System
2018
IEEE Transactions on Vehicular Technology
Through extensive analysis, simulation, and practical experiments, we demonstrate that the proposed scheme is secure against the considered attacks and can achieve full anonymity of the drivers' locations ...
Efficient cryptosystems are used to authenticate the EVs to the bank, CSP, and RSUs, but our evaluations indicate that the contact time of fast moving EVs and the CPs is too short to exchange multiple ...
Each EV maintains an account in the bank and uses the account to buy anonymous coins that are used to pay for charging and anonymously authenticate the EV to the CSP. ...
doi:10.1109/tvt.2017.2780179
fatcat:wtmaifzxobfn5gfb32deowc5z4
Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things
2018
Journal of Network and Computer Applications
In smart health, a large number of IoT devices collect SHRs and transmit them to a cloud service provider (CSP) for storage and sharing among different users. ...
In addition, privacy-aware access control is based on anonymous attribute-based encryption technologies. ...
In order to reduce the computation cost, CSP will anonymously aggregate the received SHR ciphertext and signature. CSP can check the validity of received signatures at one time. ...
doi:10.1016/j.jnca.2018.09.005
fatcat:3vy3b7zevjbfrnrgzw2zxv65vu
« Previous
Showing results 1 — 15 out of 7,589 results