287 Hits in 6.3 sec


2020 International journal for advanced research in science & technology  
The new convention offers the property of mistake resistance, in particular, it ties with private key to one personality which can be utilized to confirm the rightness of a reaction created with another  ...  A key exploration challenge related with existing plans of information reviewing conventions is the intricacy in key administration.  ...  Outsource key updates for cloud storage auditing with key-exposure resilience. Cloud storage auditing protocol with verifiable outsourcing of key updates.  ... 
doi:10.48047/ijarst/v10/i11/06 fatcat:h4mruxwojrgqpcyjfxrk46of5q

A Blockchain-Based Public Auditing Protocol with Self-Certified Public Keys for Cloud Data

Hongtao Li, Feng Guo, Lili Wang, Jie Wang, Bo Wang, Chuankun Wu, Yinghui Zhang
2021 Security and Communication Networks  
Compared with other public auditing schemes, our scheme based on the self-certified public key system has been improved in storage overhead, communication bandwidth, and verification efficiency.  ...  The security analysis shows that attackers can neither derive user's secret key nor derive users' data from the collected auditing information in the presented scheme.  ...  To ensure the integrity of the unique file identifier ID 2 , the user computes the file tag ϑ � TQID 1 ID 2 SIG sk, TQID 1 ID 2 with his private key sk � a.  ... 
doi:10.1155/2021/6623639 fatcat:xnj3x7nkpjd2leqjde5mxkbqeu

Multi-Replica and Multi-Cloud Data Public Audit Scheme Based on Blockchain

Xiaodong Yang, Xizhen Pei, Meiding Wang, Ting Li, Caifen Wang
2020 IEEE Access  
Finally, most existing schemes require TPA to be trusted. In practice, TPA may deviate from the public audit protocol or collude with cloud servers to deceive users.  ...  First of all, most of the existing schemes are based on the traditional or identity public key infrastructure. There is a problem of certificate management or key escrow.  ...  In recent years, a scheme with key-exposure resistance was designed by Yu et al. [41] .  ... 
doi:10.1109/access.2020.3014510 fatcat:z2ggfuob6rapxpcaq7pkm4wq7q

Survey on Data Integrity, Recovery, and Proof of Retrievability Techniques in Cloud Storage

Neha Narayan Kulkarni, Shital Kumar A. Jain, . .
2018 International Journal of Engineering & Technology  
This paper includes the literature review related to various techniques for data integrity, data recovery and proof of retrievability.  ...  The attacker may modify, delete or replace the data. Therefore, different models are proposed for a data integrity check and proof of retrievability.  ...  Identity-based remote data integrity checking (ID-RDIC) This scheme approaches existing complex key management issue which is dependent on public key infrastructure for checking data integrity.  ... 
doi:10.14419/ijet.v7i3.6.14938 fatcat:vabwtqgk7nffhl2llwyaw7nmbm

Lattice-Based Privacy-Preserving and Forward-Secure Cloud Storage Public Auditing Scheme

Haifeng Li, Liangliang Liu, Caihui Lan, Caifen Wang, He Guo
2020 IEEE Access  
In addition, the lattice basis delegation technique is adopted to achieve forward security for resisting key exposure attack.  ...  However, with the advent and development of quantum computer, these existing data integrity checking schemes are no longer secure.  ...  The model implements data integrity checking by using RSA-Based Homomorphic Tags without downloading the entire data files from the cloud server to achieve blockless verification.  ... 
doi:10.1109/access.2020.2991579 fatcat:sjlyxvsf5fd5vhiyhayf5ysi64

A Survey on Contemporary MANET Security: Approaches for Securing the MANET

Rajan Patel, Pariza Kamboj
2017 International Journal of Engineering and Technology  
This article is intended to provide contemporary MANET security with perspective of routing protocol security and data security with key management, and monitoring the MANET during routing and/or data  ...  It also explored various IDS schemes as a second line of defence in MANET.  ...  with high level of data integrity and authentication Real-time Recurrent Neural Network (RRNN) based symmetric cipher and trust based multipath routing Resistance to routing information disclosed  ... 
doi:10.21817/ijet/2017/v9i1/170901413 fatcat:kepeg6nwofcjjce6ubghravk4a

Improving Data Security, Privacy, and Interoperability for the IEEE Biometric Open Protocol Standard

Eduardo M. de Lacerda Filho, Geraldo P. Rocha Filho, Rafael Timoteo De Sousa, Vinicius P. Goncralves
2020 IEEE Access  
From this exposure, replays attacks [61] and Distributed DoS attacks [62] can be mitigated. V.  ...  official NIST test suite approves the randomness of the keys (k) that are generated from the proposed scheme.  ...  He has received research grants from the Brazilian research and innovation agencies CNPq, CAPES, FINEP, RNP, and FAPDF.  ... 
doi:10.1109/access.2020.3046630 fatcat:hchtczdgenekzcuc5h6kkrqjr4

Data Security and Privacy Protection for Cloud Storage: A Survey

Pan Yang, Neal N. Xiong, Jingli Ren
2020 IEEE Access  
The continuous growth of data storage pressure drives the rapid development of the entire storage market on account of massive data generated.  ...  Currently, the governments, enterprises and individual users are actively migrating their data to the cloud. Such a huge amount of data can create magnanimous wealth.  ...  This scheme implements remote data integrity auditing for cloud-based smart grid data management systems.  ... 
doi:10.1109/access.2020.3009876 fatcat:6kcb3junlzhvvcq3qhztumpdqq

Dynamic and Secure Public Auditing of User Data in Cloud by Using IRSAC

2022 International Journal of Intelligent Engineering and Systems  
Xu, “Identity-based key-exposure resilient cloud storage public auditing scheme from lattices”, Information Sciences, Vol. 472, pp. 223-234, 2019. [10] J. Zhao, C. Xu, and K.  ...  “Attribute-based public integrity auditing for [17] K. El Makkaoui, A. Ezzati, A. Beni-Hssane, and shared data with efficient user revocation in cloud S.  ... 
doi:10.22266/ijies2022.0228.01 fatcat:asxb5o3wkfbthkm37rytkqcgvu

Efficient Group Proof of Storage with Malicious-Member Distinction and Revocation

Liehuang Zhu, Hongyuan Wang, Chang Xu, Kashif Sharif, Rongxing Lu
2019 IEEE Access  
From a security perspective, DR-GPOS can also resist against selective attacks and the collusion attacks from the revoked members (e.g. forging proofs by colluding with the server).  ...  In this paper, based on matrix calculation, pseudo-random functions, and commitment functions, we propose a new Group Proof of Storage with Malicious-Member Distinction and Revocation scheme (DR-GPOS).  ...  are applied in group application. 1) SCHEMES BASED ON RSA Ateniese et al  ... 
doi:10.1109/access.2019.2917919 fatcat:itpidrsokbe55nfkj46enlgvdu

Shared and Searchable Encrypted Data for Untrusted Servers [chapter]

Changyu Dong, Giovanni Russello, Naranker Dulay
2008 Lecture Notes in Computer Science  
users, with key revocation requiring costly data re-encryption.  ...  In this paper, we propose an encryption scheme where each authorised user in the system has his own keys to encrypt and decrypt data.  ...  One aspect of our future work is to investigate and integrate our scheme with Private Information Retrieval (PIR) schemes.  ... 
doi:10.1007/978-3-540-70567-3_10 fatcat:cidaw6e5rjfpbpksvinm3taj4i

An User Authentication Scheme Based on the ECC and OpenID Techniques in the Internet of Things

Jong J. Lee, Ki Young Lee
2016 International Journal of Security and Its Applications  
In this paper, we focus on simple and efficient secure key establishment based on ECC (Elliptic Curve Cryptosystem). And we proposed ECC and OpenID based user authentication scheme.  ...  Based on this message, we verify the identity of the "things".  ...  On the other hand, PKC-based schemes suffer from high energy consumption and considerable time delay.  ... 
doi:10.14257/ijsia.2016.10.11.07 fatcat:zxv5mwp3j5glddapezv7kqp4na

Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols

Daniel Gerbi Duguma, Ilsun You, Yonas Engida Gebremariam, Jiyoon Kim
2021 Sensors  
To date, various researchers have proposed different countermeasures to keep the confidentiality, integrity, and availability of IMD systems with privacy and safety specifications.  ...  In addition, we compared these schemes against their security strengths, computational overheads, latency, and other vital features, such as emergency authentications, key update mechanisms, and adaptabilities  ...  Data Availability Statement: Not applicable. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s21248383 pmid:34960473 pmcid:PMC8704301 fatcat:4n2bb6stezh3blnfipvirjcftq

A Survey on Secure Cloud-Based E-Health Systems

Dilip Yadav, Sephali Behera
2018 EAI Endorsed Transactions on Pervasive Health and Technology  
Seventy-seven research papers related to secure cloud-based e-health systems are collected from different sources till 2019.  ...  The e-health data on the cloud should be available only to the data owner. This work presents a literature survey on secure cloud-based e-health systems.  ...  his data, data confidentiality, data integrity, non-repudiation, auditing, consent exception  ... 
doi:10.4108/eai.13-7-2018.163308 fatcat:zxjtineopbautdg6nlqr3e4fma

FPGA-based Digital Quantum Coprocessor

Valerii Hlukhov, Lviv Polytechnic National University, Computer Engineering Department, Bohdan Havano
2018 Advances in Cyber-Physical Systems  
Merkle Tree: A quantum safe public key cryptography system based on a tree of message digests where each child leaf is computed using a cryptographic hash function that is keyed with a key derived from  ...  It is used to secure communication by protecting the confidentiality and integrity of messages and sensitive data. Without it, anyone could read a message or forge a private conversation.  ...  and data integrity.  ... 
doi:10.23939/acps2018.02.067 fatcat:7txboogyr5f5vgc5c5zzbovv34
« Previous Showing results 1 — 15 out of 287 results