113 Hits in 5.0 sec

Data Security and Privacy Protection for Cloud Storage: A Survey

Pan Yang, Neal N. Xiong, Jingli Ren
2020 IEEE Access  
Secondly, we give a detailed analysis on challenges and requirements of data security and privacy protection in cloud storage system.  ...  The continuous growth of data storage pressure drives the rapid development of the entire storage market on account of massive data generated.  ...  Different from identity based encryption, identity is replaced by a set of attributes in the attribute based encryption, and only users whose attribute set matches the access policy can access the encrypted  ... 
doi:10.1109/access.2020.3009876 fatcat:6kcb3junlzhvvcq3qhztumpdqq

Identity-Based Encryption with Outsourced Revocation in Cloud Computing

Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia, Wenjing Lou
2015 IEEE transactions on computers  
Identity-Based Encryption (IBE) which simplifies the public key and certificate management at Public Key Infrastructure (PKI) is an important alternative to public key encryption.  ...  In this paper, aiming at tackling the critical issue of identity revocation, we introduce outsourcing computation into IBE for the first time and propose a revocable IBE scheme in the server-aided setting  ...  Based on the system model proposed, we are able to define the outsourced revocable IBE scheme.  ... 
doi:10.1109/tc.2013.208 fatcat:rwl4p7yx5nfknaprwjgpnh6lwm

Server-Aided Revocable Identity-Based Encryption from Lattices [chapter]

Khoa Nguyen, Huaxiong Wang, Juanyang Zhang
2016 Lecture Notes in Computer Science  
Server-aided revocable identity-based encryption (SR-IBE), recently proposed by Qin et al. at ESORICS 2015, offers significant advantages over previous user revocation mechanisms in the scope of IBE.  ...  s work, we design the first SR-IBE scheme from lattice assumptions. Our scheme is more efficient than existing constructions of lattice-based revocable IBE.  ...  The research was supported by the "Singapore Ministry of Education under Research Grant MOE2013-T2-1-041". Huaxiong Wang was also supported by NTU under Tier 1 grant RG143/14.  ... 
doi:10.1007/978-3-319-48965-0_7 fatcat:2m2au6tqvrhgdiato6wyj6eslq

A Survey on Privacy Preserving in Authentication Protocol for Shared Authority Based Cloud Computing

Thoke Virendra Dilip
2017 International Journal for Research in Applied Science and Engineering Technology  
Cloud services offer nice conveniences for the users to fancy the on-demand cloud applications while not considering the native infrastructure limitations. throughout the information accessing, completely  ...  multiple users in cloud storage. so as to avoid of these things, a system is projected during which a shared authority primarily based privacy-preserving authentication protocol (SecCloud) to resolve  ...  The techniques of Two-to-One Recoding (TOR), and sampling on lattices, we propose a new Key-Policy Attribute-Based Encryption (KP-ABE) scheme for circuits of any arbitrary polynomial on lattices, and prove  ... 
doi:10.22214/ijraset.2017.3096 fatcat:jb2ujj3h2fbupfgbmejo764vgq

Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation [article]

San Ling and Khoa Nguyen and Huaxiong Wang and Juanyang Zhang
2018 arXiv   pre-print
Such a revocation mechanism was considered in the settings of identity-based encryption and attribute-based encryption by Qin et al. (ESORICS 2015) and Cui et al. (ESORICS 2016), respectively.  ...  s work into the PE context. Second, we put forward a lattice-based instantiation of SR-PE.  ...  We thank the reviewers for helpful discussions and comments. The research was supported by the "Singapore Ministry of Education under Research Grant MOE2016-T2-2-014(S)".  ... 
arXiv:1801.07844v1 fatcat:pys76zim4jfelko5epa3ai6wpa

Special issue on security and privacy techniques in mobile cloud computing

Ilsun You, Jin Li
2016 Journal of Ambient Intelligence and Humanized Computing  
The authors presented an IB-PRE scheme based on lattices with the highly desirable properties of anonymity, uni-directionality, multi-use and backward collusion safety.  ...  This outsourcing paradigm raises a new challenge for carrying data inside the mobile devices as well as for the privacy of outsourced identities.  ...  Moreover, the authors proposed a public key encryption scheme to secure against affine related-key attacks based on the lattice.  ... 
doi:10.1007/s12652-016-0390-3 fatcat:hiknxbyj5rcjvaxnulkzyj4z7e

AKC-Based Revocable ABE Schemes from LWE Assumption

Leixiao Cheng, Fei Meng, Xianmeng Meng, Qixin Zhang, Barbara Masucci
2020 Security and Communication Networks  
lemma, and binary tree structure, we propose two directly revocable ciphertext-policy attribute-based encryption (DR-ABE) schemes from LWE, which support flexible threshold access policies on multivalued  ...  To be specific, on the basis of AKC and PKE/KEM protocols submitted to the NIST based on LWE and its variants, combined with full-rank difference, trapdoor on lattices, sampling algorithms, leftover hash  ...  To demonstrate the versatility of KC/AKC, we propose two DR-ABE schemes from lattices based on AKCN (Algorithm 1), which supports user-level user revocation and attribute-level user revocation in Sections  ... 
doi:10.1155/2020/8834872 fatcat:5no3rle5zjak7l6ckytzpquwcu

Server-Aided Revocable Attribute-Based Encryption from Lattices

Xingting Dong, Yanhua Zhang, Baocang Wang, Jiangshan Chen
2020 Security and Communication Networks  
In the standard model, our scheme is proved to be secure based on the hardness of the Learning With Errors (LWE) problem.  ...  Although there are many constructions about revocable ABE from bilinear maps, the situation with lattice-based constructions is less satisfactory, and a few efforts were made to close this gap.  ...  Introduction Attribute-based encryption (ABE) [1, 2] , which was first introduced in 2006 as a generalization of identity-based encryption (IBE) [3, 4] and fuzzy identity-based encryption (FIBE) [1  ... 
doi:10.1155/2020/1460531 fatcat:6kevau6x5baivlri5wt2fyjtnu

Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation

David Nuñez, Isaac Agudo, Javier Lopez
2017 Journal of Network and Computer Applications  
Additionally, we also study the efficiency of selected schemes, both theoretically and empirically, based on our own implementation.  ...  Proxy re-encryption is a special type of public-key encryption that permits a proxy to transform ciphertexts from one public key to another, without the proxy being able to learn any information about  ...  Acknowledgements This work was partly supported by the Junta de Andalucía through the project FISICCO (P11-TIC-07223) and by the Spanish Ministry of Economy and Competitiveness through the PER-SIST project  ... 
doi:10.1016/j.jnca.2017.03.005 fatcat:wlmfwffpwffnjhkopjuwg4yqfe

New Public Integrity Auditing Scheme for Cloud Data Storage Using Mac And Symmetric Key Cryptographic Algorithms

A. Emily Jenifer, S. Karthigaiveni
2016 International Journal of Applied Engineering Research  
But, it is not secure against the collusion of cloud data and it revokes the group of users during the user revocation in cloud system.  ...  The proposed system supports an effective user revocation and public checking processes.  ...  Performance Analysis This section presents the performance analysis of proposed method and compared with the existing Advanced Encryption Standard (AES) scheme on the parameters of computational time,  ... 
doi:10.37622/ijaer/11.3.2016.1894-1899 fatcat:flcgqm5tkzgengqu45gar24pfa

2020 Index IEEE Transactions on Dependable and Secure Computing Vol. 17

2021 IEEE Transactions on Dependable and Secure Computing  
-Oct. 2020 1026-1038 Lattice-Based Public Key Searchable Encryption from Experimental Perspectives. Behnia, R., +, TDSC Nov.  ...  ., +, TDSC July-Aug. 2020 883- 897 Lattice-Based Public Key Searchable Encryption from Experimental Per- spectives. Behnia, R., +, TDSC Nov.  ...  Sensitivity Analysis for Non-Interactive Differential Privacy: Bounds and Efficient Algorithms. Inan, A., +, TDSC Jan.-Feb. 2020 194-207  ... 
doi:10.1109/tdsc.2020.3038615 fatcat:vzqqhgq3rrda3atviwpz65ch5e

Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges and Solutions

Pan Jun Sun
2019 IEEE Access  
In recent years, there are many research schemes of cloud computing privacy protection based on access control, attribute-based encryption (ABE), trust and reputation, but they are scattered and lack unified  ...  encryption), CP-ABE (ciphertext policy attribute-based encryption), access structure, revocation mechanism, multiauthority, fine-grained, trace mechanism, proxy re-encryption(PRE), hierarchical encryption  ...  hierarchical attribute-based encryption (HABE, Fig. 13 ) and hierarchical attribute-set-based encryption (HASBE) and so on [72] . 1) HIERARCHICAL IDENTITY-BASED ENCRYPTION (HIBE) Identity-based encryption  ... 
doi:10.1109/access.2019.2946185 fatcat:tbg5a25f5rd3je4mogemegrvje

A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems

Hanshu Hong, Ximeng Liu, Zhixin Sun
2018 Journal on spesial topics in mobile networks and applications  
Attribute based encryption is suitable for data protection in data outsourcing systems such as cloud computing.  ...  However, the leveraging of encryption technique may retrain some routine operations over the encrypted data, particularly in the field of data retrieval.  ...  Acknowledgements This research is supported by the National Natural Science Foundation of China (61373135, 61672299).  ... 
doi:10.1007/s11036-018-1102-3 fatcat:oakqebrdnvcz5pw7vww3eql75i

Biometric based Multi-Authority Inner Product Encryption for Electronic Health Record

C. Exceline, Jasmine Norman
2018 EAI Endorsed Transactions on Pervasive Health and Technology  
Attribute-based encryption enhances the security of electronic health records outsourced to the cloud.  ...  The security analysis and computational complexity of the proposed scheme is done and compared with existing schemes.  ...  Identity-based encryption also poses the former problem, and the management of certificates for each identity is cumbersome.  ... 
doi:10.4108/eai.13-7-2018.163135 fatcat:hpfbxus24jb35i6updbpivgucu

Public Key Encryption with Keyword Search in Cloud: A Survey

Yunhong Zhou, Na Li, Yanmei Tian, Dezhi An, Licheng Wang
2020 Entropy  
From a technological viewpoint, the existing PEKS schemes can be classified into several variants: PEKS based on public key infrastructure, PEKS based on identity-based encryption, PEKS based on attribute-based  ...  With the popularization of cloud computing, many business and individuals prefer to outsource their data to cloud in encrypted form to protect data confidentiality.  ...  [50] proposed a PEKS scheme supporting keyword revocable based on partially-anonymous identity-based encryption.  ... 
doi:10.3390/e22040421 pmid:33286195 pmcid:PMC7516898 fatcat:qovvzpdonnbd5bswb7j7q5igiq
« Previous Showing results 1 — 15 out of 113 results