A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
FUZZY IDENTITY-BASED DATA INTEGRITY AUDITING FOR DEPENDABLE CLOUD STORAGE SYSTEMS
2020
International journal for advanced research in science & technology
The new convention offers the property of mistake resistance, in particular, it ties with private key to one personality which can be utilized to confirm the rightness of a reaction created with another ...
A key exploration challenge related with existing plans of information reviewing conventions is the intricacy in key administration. ...
Outsource key updates for cloud storage auditing with key-exposure resilience. Cloud storage auditing protocol with verifiable outsourcing of key updates. ...
doi:10.48047/ijarst/v10/i11/06
fatcat:h4mruxwojrgqpcyjfxrk46of5q
A Blockchain-Based Public Auditing Protocol with Self-Certified Public Keys for Cloud Data
2021
Security and Communication Networks
Compared with other public auditing schemes, our scheme based on the self-certified public key system has been improved in storage overhead, communication bandwidth, and verification efficiency. ...
The security analysis shows that attackers can neither derive user's secret key nor derive users' data from the collected auditing information in the presented scheme. ...
To ensure the integrity of the unique file identifier ID 2 , the user computes the file tag ϑ � TQID 1 ID 2 SIG sk, TQID 1 ID 2 with his private key sk � a. ...
doi:10.1155/2021/6623639
fatcat:xnj3x7nkpjd2leqjde5mxkbqeu
Multi-Replica and Multi-Cloud Data Public Audit Scheme Based on Blockchain
2020
IEEE Access
Finally, most existing schemes require TPA to be trusted. In practice, TPA may deviate from the public audit protocol or collude with cloud servers to deceive users. ...
First of all, most of the existing schemes are based on the traditional or identity public key infrastructure. There is a problem of certificate management or key escrow. ...
In recent years, a scheme with key-exposure resistance was designed by Yu et al. [41] . ...
doi:10.1109/access.2020.3014510
fatcat:z2ggfuob6rapxpcaq7pkm4wq7q
Survey on Data Integrity, Recovery, and Proof of Retrievability Techniques in Cloud Storage
2018
International Journal of Engineering & Technology
This paper includes the literature review related to various techniques for data integrity, data recovery and proof of retrievability. ...
The attacker may modify, delete or replace the data. Therefore, different models are proposed for a data integrity check and proof of retrievability. ...
Identity-based remote data integrity checking (ID-RDIC) This scheme approaches existing complex key management issue which is dependent on public key infrastructure for checking data integrity. ...
doi:10.14419/ijet.v7i3.6.14938
fatcat:vabwtqgk7nffhl2llwyaw7nmbm
Lattice-Based Privacy-Preserving and Forward-Secure Cloud Storage Public Auditing Scheme
2020
IEEE Access
In addition, the lattice basis delegation technique is adopted to achieve forward security for resisting key exposure attack. ...
However, with the advent and development of quantum computer, these existing data integrity checking schemes are no longer secure. ...
The model implements data integrity checking by using RSA-Based Homomorphic Tags without downloading the entire data files from the cloud server to achieve blockless verification. ...
doi:10.1109/access.2020.2991579
fatcat:sjlyxvsf5fd5vhiyhayf5ysi64
A Survey on Contemporary MANET Security: Approaches for Securing the MANET
2017
International Journal of Engineering and Technology
This article is intended to provide contemporary MANET security with perspective of routing protocol security and data security with key management, and monitoring the MANET during routing and/or data ...
It also explored various IDS schemes as a second line of defence in MANET. ...
with high
level of data integrity
and authentication
Real-time Recurrent Neural
Network (RRNN) based
symmetric cipher and trust
based multipath routing
Resistance to routing
information disclosed ...
doi:10.21817/ijet/2017/v9i1/170901413
fatcat:kepeg6nwofcjjce6ubghravk4a
Improving Data Security, Privacy, and Interoperability for the IEEE Biometric Open Protocol Standard
2020
IEEE Access
From this exposure, replays attacks [61] and Distributed DoS attacks [62] can be mitigated.
V. ...
official NIST test suite approves the randomness of the keys (k) that are generated from the proposed scheme. ...
He has received research grants from the Brazilian research and innovation agencies CNPq, CAPES, FINEP, RNP, and FAPDF. ...
doi:10.1109/access.2020.3046630
fatcat:hchtczdgenekzcuc5h6kkrqjr4
Data Security and Privacy Protection for Cloud Storage: A Survey
2020
IEEE Access
The continuous growth of data storage pressure drives the rapid development of the entire storage market on account of massive data generated. ...
Currently, the governments, enterprises and individual users are actively migrating their data to the cloud. Such a huge amount of data can create magnanimous wealth. ...
This scheme implements remote data integrity auditing for cloud-based smart grid data management systems. ...
doi:10.1109/access.2020.3009876
fatcat:6kcb3junlzhvvcq3qhztumpdqq
Dynamic and Secure Public Auditing of User Data in Cloud by Using IRSAC
2022
International Journal of Intelligent Engineering and Systems
Xu, “Identity-based
key-exposure resilient cloud storage public
auditing scheme from lattices”, Information
Sciences, Vol. 472, pp. 223-234, 2019.
[10] J. Zhao, C. Xu, and K. ...
“Attribute-based public integrity auditing for [17] K. El Makkaoui, A. Ezzati, A. Beni-Hssane, and
shared data with efficient user revocation in cloud S. ...
doi:10.22266/ijies2022.0228.01
fatcat:asxb5o3wkfbthkm37rytkqcgvu
Efficient Group Proof of Storage with Malicious-Member Distinction and Revocation
2019
IEEE Access
From a security perspective, DR-GPOS can also resist against selective attacks and the collusion attacks from the revoked members (e.g. forging proofs by colluding with the server). ...
In this paper, based on matrix calculation, pseudo-random functions, and commitment functions, we propose a new Group Proof of Storage with Malicious-Member Distinction and Revocation scheme (DR-GPOS). ...
are applied in group application.
1) SCHEMES BASED ON RSA Ateniese et al ...
doi:10.1109/access.2019.2917919
fatcat:itpidrsokbe55nfkj46enlgvdu
Shared and Searchable Encrypted Data for Untrusted Servers
[chapter]
2008
Lecture Notes in Computer Science
users, with key revocation requiring costly data re-encryption. ...
In this paper, we propose an encryption scheme where each authorised user in the system has his own keys to encrypt and decrypt data. ...
One aspect of our future work is to investigate and integrate our scheme with Private Information Retrieval (PIR) schemes. ...
doi:10.1007/978-3-540-70567-3_10
fatcat:cidaw6e5rjfpbpksvinm3taj4i
An User Authentication Scheme Based on the ECC and OpenID Techniques in the Internet of Things
2016
International Journal of Security and Its Applications
In this paper, we focus on simple and efficient secure key establishment based on ECC (Elliptic Curve Cryptosystem). And we proposed ECC and OpenID based user authentication scheme. ...
Based on this message, we verify the identity of the "things". ...
On the other hand, PKC-based schemes suffer from high energy consumption and considerable time delay. ...
doi:10.14257/ijsia.2016.10.11.07
fatcat:zxv5mwp3j5glddapezv7kqp4na
Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols
2021
Sensors
To date, various researchers have proposed different countermeasures to keep the confidentiality, integrity, and availability of IMD systems with privacy and safety specifications. ...
In addition, we compared these schemes against their security strengths, computational overheads, latency, and other vital features, such as emergency authentications, key update mechanisms, and adaptabilities ...
Data Availability Statement: Not applicable.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/s21248383
pmid:34960473
pmcid:PMC8704301
fatcat:4n2bb6stezh3blnfipvirjcftq
A Survey on Secure Cloud-Based E-Health Systems
2018
EAI Endorsed Transactions on Pervasive Health and Technology
Seventy-seven research papers related to secure cloud-based e-health systems are collected from different sources till 2019. ...
The e-health data on the cloud should be available only to the data owner. This work presents a literature survey on secure cloud-based e-health systems. ...
his data, data confidentiality, data integrity, non-repudiation, auditing, consent exception ...
doi:10.4108/eai.13-7-2018.163308
fatcat:zxjtineopbautdg6nlqr3e4fma
FPGA-based Digital Quantum Coprocessor
2018
Advances in Cyber-Physical Systems
Merkle Tree: A quantum safe public key cryptography system based on a tree of message digests where each child leaf is computed using a cryptographic hash function that is keyed with a key derived from ...
It is used to secure communication by protecting the confidentiality and integrity of messages and sensitive data. Without it, anyone could read a message or forge a private conversation. ...
and data integrity. ...
doi:10.23939/acps2018.02.067
fatcat:7txboogyr5f5vgc5c5zzbovv34
« Previous
Showing results 1 — 15 out of 287 results