Filters








7,589 Hits in 1.9 sec

CSP and anonymity [chapter]

Steve Schneider, Abraham Sidiropoulos
1996 Lecture Notes in Computer Science  
I t proposes a de nition of anonymity within the CSP notation, discusses the approach taken by CSP to anonymity with respect to di erent viewpoints, and illustrates this approach on some toy examples,  ...  and then applies it to a machine-assisted analysis of the dining cryptographers example and some variants.  ...  Acknowledgements Thanks are due to Peter Ryan for posing the dining cryptographers as a challenge for anonymity, and for his comments to Birgit P tzmann for a thorough reading and detailed comments and  ... 
doi:10.1007/3-540-61770-1_38 fatcat:q5yx2aj2m5hgrpg47iycnlo2za

Privacy-preserving security solution for cloud services

L. Malina, J. Hajny, P. Dzurenda, V. Zeman
2015 Journal of Applied Research and Technology  
Our solution is based on an efficient nonbilinear group signature scheme providing the anonymous access to cloud services and shared storage servers.  ...  However, if a user breaks provider's rules, his access right is revoked.Our solution provides anonymous access, unlinkability and the confidentiality of transmitted data.  ...  Acknowledgments This research work is funded by project SIX CZ.1.05/2.1.00/03.0072; the Technology Agency of the Czech Republic projects TA02011260 and TA03010818; the Ministry of Industry and Trade of  ... 
doi:10.1016/s1665-6423(15)30002-x fatcat:zfxcb67cuzduvphn5b5xu4bv44

SAPPHIRE: Anonymity for enhanced control and private collaboration in healthcare clouds

John Pecarina, Shi Pu, Jyh-Charn Liu
2012 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings  
To realize the paradigm shift, it is necessary to provide anonymity in data storage and separate the administration of access policy and authorization from the mechanisms used for enforcement.  ...  Our analysis shows that SAPPHIRE is a viable extension of collaborative health information systems through the provision of anonymity and enhanced policy administration for the primary data owner.  ...  Anonymous PHR Submission between Bob and the CSP using Exchange to port message traffic between secure channels.  ... 
doi:10.1109/cloudcom.2012.6427488 dblp:conf/cloudcom/PecarinaPL12 fatcat:l3omsvzbk5eo7ocsusssa4cbxu

Constrained obfuscation of relational databases

Erez Shmueli, Tomer Zrihen, Ran Yahalom, Tamir Tassa
2014 Information Sciences  
and anonymization of social networks.  ...  Finally, we evaluate the new method in terms of privacy, utility and execution time.  ...  The two dependent CSPs: CSP 5 and CSP 6 and the two dependent CSPs: CSP 7 and CSP 8 are solved iteratively. Note that the age attribute is copied from T at stage 1 and is not modified later.  ... 
doi:10.1016/j.ins.2014.07.009 fatcat:zxcfs3jvz5hndgvyla7mderivm

A Brief Survey on Various Technologies Involved in Cloud Computing Security

Vindhuja E., Dr.N. Umadevi
2020 Asian journal of applied science and technology  
Transparency Anonymisation is fully transparent: no metadata or key information has to be stored on the anonymized data by a proxy and the CSP will work on it as if it were an original data.  ...  However, the core materials are also managed by the CSP in these systems, and the protection of the outsourced data relies on the trusting relationship between consumers and the CSP.  ... 
doi:10.38177/ajast.2020.4316 fatcat:upcqppapsnezvahckbwdw5345e

A Reputation-Based Identity Management Model for Cloud Computing

Lifa Wu, Shengli Zhou, Zhenji Zhou, Zheng Hong, Kangyu Huang
2015 Mathematical Problems in Engineering  
Analysis verifies that the model can ensure that users access cloud services anonymously and that cloud providers assess the credibility of users effectively without violating user privacy.  ...  To solve these problems, we introduce a reputation mechanism and design a reputation-based identity management model for cloud computing.  ...  Also, we assume that the IdP and CSP can collude together to compromise anonymity. These assumptions comply with the actual situation, for the IdP and CSP may belong to the same institution.  ... 
doi:10.1155/2015/238245 fatcat:4oxog2xw2re2tl5mvjiyfjuzwq

Cooperative Query Answer Authentication Scheme Over Anonymous Sensing Data

Liangmin Wang, Qingqing Xie, Hong Zhong
2017 IEEE Access  
Thus in some specific application scenarios, the DO is also called as the anonymous data provider. • The CSP provides the paid service for users.  ...  But the cloud service providers (CSP) are often untrustworthy. The privacy and security concerns emerge over the authenticity of the query answer and the leakage of the DO identity.  ...  the CSP and the user.  ... 
doi:10.1109/access.2017.2676008 fatcat:pduaywxl3fhxlloo6zsdossao4

Formal Analyze of a Private Access Control Protocol to a Cloud Storage

Mouhebeddine Berrima, Pascal Lafourcade, Matthieu Giraud, Narjes Ben Rajeb
2017 Proceedings of the 14th International Joint Conference on e-Business and Telecommunications  
We clarify several ambiguities in the design of this protocol and model the protocol and its security properties with ProVerif an automatic tool for the verification of cryptographic protocols.  ...  We propose a correction, and automatically prove the security of the corrected protocol with ProVerif. * Our ProVerif codes are avaible under request via the PC and will be publicly available if the paper  ...  ' attributes, and a CSP.  ... 
doi:10.5220/0006461604950500 dblp:conf/secrypt/Berrima0GR17 fatcat:e2nb4hlnofg3teeelru5p4bt2m

Location Data and COVID-19 Contact Tracing: How Data Privacy Regulations and Cell Service Providers Work In Tandem [article]

Callie Monroe, Faiza Tazi, Sanchari Das
2021 arXiv   pre-print
Accordingly, it might be speculated that CSPs collect information violating the privacy policies such as GDPR, CCPA, and others.  ...  We found that three of the regulations (GDPR, COPPA, and CCPA) analyzed defined mobile location data as private information, and two (T-Mobile US, Boost Mobile) of the five CSPs that were analyzed did  ...  ACKNOWLEDGMENTS We would like to acknowledge the Security and Privacy Research Lab at the University of Denver and the students of the COMP 3705/4705 : Adv Topics: Human-Centered Data Security and Privacy  ... 
arXiv:2103.14155v2 fatcat:3woqfkjxbnhn3g5wkuchqilkfu

A Privacy-Preserving Personalized Service Framework through Bayesian Game in Social IoT

Renwan Bi, Qianxin Chen, Lei Chen, Jinbo Xiong, Dapeng Wu, Ximeng Liu
2020 Wireless Communications and Mobile Computing  
These classification results facilitate trustworthy cloud service providers (CSPs) in providing users with corresponding levels of services.  ...  Furthermore, the CSP makes a strategic choice with the goal of maximizing reputation through playing a decision-making game with potential adversaries.  ...  Xie and Zheng [31] proposed a differential social network anonymous algorithm satisfying k-anonymity and l-diversity.  ... 
doi:10.1155/2020/8891889 fatcat:x6cfsnmu5jfs7bxh4qqym2ktxa

Comments on "ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes"

Sungjin Yu, Ashok Kumar Das, Youngho Park
2021 IEEE Access  
Thus, ALAM scheme cannot ensure user anonymity and mutual authentication.  ...  After that, CT generates a random nonce C n and computes CSP M ID = h(U ID ||M ID ||C n ) and SID u = E kuc (U ID , M ID , CSP M ID , T F seq ).  ... 
doi:10.1109/access.2021.3068723 fatcat:bk6us2iyfjeivm5kmuaoptrrti

ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids

Muhammad Tanveer, Abd Ullah Khan, Habib Shah, Ahmed Alkhayyat, Shehzad Ashraf Chaudhry, Musheer Ahmad
2021 IEEE Access  
SM's anonymity.  ...  Hence, ARAP-SG ensure the anonymity and untraceablity features. 5) Anonymity and Untraceablity Suppose that 6) SM Capture Attack After capturing SM y deployed in SG environment, A can extricate the  ...  He is a member of an editorial board, a guest editor, and acts as a reviewer for various journals and conferences as well.  ... 
doi:10.1109/access.2021.3121291 fatcat:tjcqazmk3zguvltl4nu5lvsl3u

PRIVACY PRESERVING LOCATION BASED SERVICES QUERY SCHEME BASED ON FULLY HOMOMORPHIC ENCRYPTION

FIFI FAROUK, YASMIN ALKADY, RAWYA RIZK
2021 Zenodo  
the LBSP and cloud Server Provider (CSP).  ...  The results prove the feasibility and efficiency of PPQ_FHE scheme in terms of query's response time, query accuracy, throughput and query overhead.  ...  Also, there are no CSP computation complexities for K-anonymity, PCQP and LPCQP because there is no data outsourcing to cloud.  ... 
doi:10.5281/zenodo.5393261 fatcat:a3leinfljzcbfcx36wt37uu6s4

Secure and Privacy-Preserving Physical-Layer-Assisted Scheme for EV Dynamic Charging System

Marbin Pazos-Revilla, Ahmad Alsharif, Surya Gunukula, Terry N. Guo, Mohamed Mahmoud, Xuemin Shen
2018 IEEE Transactions on Vehicular Technology  
Through extensive analysis, simulation, and practical experiments, we demonstrate that the proposed scheme is secure against the considered attacks and can achieve full anonymity of the drivers' locations  ...  Efficient cryptosystems are used to authenticate the EVs to the bank, CSP, and RSUs, but our evaluations indicate that the contact time of fast moving EVs and the CPs is too short to exchange multiple  ...  Each EV maintains an account in the bank and uses the account to buy anonymous coins that are used to pay for charging and anonymously authenticate the EV to the CSP.  ... 
doi:10.1109/tvt.2017.2780179 fatcat:wtmaifzxobfn5gfb32deowc5z4

Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things

Yinghui Zhang, Robert H. Deng, Gang Han, Dong Zheng
2018 Journal of Network and Computer Applications  
In smart health, a large number of IoT devices collect SHRs and transmit them to a cloud service provider (CSP) for storage and sharing among different users.  ...  In addition, privacy-aware access control is based on anonymous attribute-based encryption technologies.  ...  In order to reduce the computation cost, CSP will anonymously aggregate the received SHR ciphertext and signature. CSP can check the validity of received signatures at one time.  ... 
doi:10.1016/j.jnca.2018.09.005 fatcat:3vy3b7zevjbfrnrgzw2zxv65vu
« Previous Showing results 1 — 15 out of 7,589 results