A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Publicly Verifiable Secret Sharing for Cloud-Based Key Management
[chapter]
2011
Lecture Notes in Computer Science
Security for our PKE supporting PVSS schemeIf a polynomial time adversary A wins the security game for PKE scheme supporting publicly verifiable secret-sharing scheme, then there exists a polynomial time ...
If x is a leaf node then let y i ∈ SK S be the secret key corresponding to PP i where i = id(x). ...
doi:10.1007/978-3-642-25578-6_21
fatcat:h73eks4pkbhorkfhs77spn4thi
Secret shares to protect health records in Cloud-based infrastructures
2015
2015 17th International Conference on E-health Networking, Application & Services (HealthCom)
This paper outlines a novel Cloud-based architecture (SECRET) which supports keyless encryption methods and which can be used for the storage of patient information, along with supporting failover and ...
Increasingly health records are stored in cloudbased systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. ...
The PVSS is essentially a combination of secret sharing and publicly verifiable encryption.
V. ...
doi:10.1109/healthcom.2015.7454589
dblp:conf/healthcom/BuchananUDFRLT15
fatcat:ztnrronlb5bxvndvlt2z4rv4xm
Security and Privacy Sustained Cloud Data Authentication using IDM
2015
International Journal of Science and Research (IJSR)
In this paper, we propose a secure multiowner data sharing scheme for dynamic groups in the cloud. ...
By aid of group signature and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others. ...
One part of the key is stored with the user details in cloud which is used for traceability phase. Secret key is also used for signature generation and decryption process. ...
doi:10.21275/v4i11.sub159126
fatcat:2fhymi3xfzhqpijsjc4n6ckvlq
The Future Internet: A World of Secret Shares
2015
Future Internet
The paper outlines a novel architecture: SECRET, which supports a robust cloud-based infrastructure with in-built privacy and failover. ...
In order to understand the performance overhead of SECRET, the paper outlines a range of experiments that investigate the overhead of this and other secret share methods. ...
Rabin's and Ben-Or's Publicly Verifiable Secret Sharing (PVSS) Some applications of a secret sharing scheme, such as e-auction, e-voting and multiparty computation, require public verifiability. ...
doi:10.3390/fi7040445
fatcat:7r3m2lw6jjbdzmy42vhx5ns4xq
FUZZY IDENTITY-BASED DATA INTEGRITY AUDITING FOR DEPENDABLE CLOUD STORAGE SYSTEMS
2020
International journal for advanced research in science & technology
In this paper, we look to address the unpredictable key administration challenge in cloud information uprightness checking by presenting fluffy personality based examining, the first in such a methodology ...
We formalize the framework model and the security model for this new crude. ...
Outsource key updates for cloud storage auditing with key-exposure resilience. Cloud storage auditing protocol with verifiable outsourcing of key updates. ...
doi:10.48047/ijarst/v10/i11/06
fatcat:h4mruxwojrgqpcyjfxrk46of5q
Security and Privacy Challenges in Cloud Computing Environments
2010
IEEE Security and Privacy
Cloud computing provides an economical and efficient solution for sharing group resources among cloud users. ...
User revocation list is performed by group manager and it is given to the cloud service provider to check the active users within the group before giving access to the cloud. ...
Public key for encrypting the data and private key is kept secret and is used for decrypting the data files. ...
doi:10.1109/msp.2010.186
fatcat:oyqbvlgbzfb55fankcm7xhcsqq
Cloud Data Sharing in a Dynamic Group with a Dual Secure Technology
2014
IOSR Journal of Computer Engineering
In this paper, we propose a secure multiowner data sharing scheme for dynamic groups in the cloud. ...
By aid of group signature and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others. ...
We also convey our thanks to all the staff members of SIT for helping in the project. ...
doi:10.9790/0661-162107073
fatcat:teuhr62bijeebjvyx4v62iywya
Robust and Simple N-Party Entangled Authentication Cloud Storage Protocol Based on Secret Sharing Scheme
2013
Journal of Information Hiding and Multimedia Signal Processing
Its main idea is to use entangled method for designing a scheme which has four key policies: (i) N-clients can easily entangle their files into a single secret c to be store by a cloud storage provider ...
Entangled cloud storage schemes think in different ways with traditional cloud storage secure schemes which provide high level security to force cloud storage servers for treating equally between normal ...
derivation tree to organize and manage keys which are pushed to DHT (Distributed Hash Table) network after partitioned by secret sharing scheme. ...
dblp:journals/jihmsp/ZhuLZL13
fatcat:hlx35t3bn5chdbgxdcn45tyc7u
Proficient Justification of Data Accuracy for Cloud Storage Using Dual Protection
2019
International Journal of Scientific Research in Science and Technology
At the time of download key generated (code based key generation) and it will send to the file owner. ...
In our system we are using the own auditing based on the token generation. Using this key generation technique compare the key values from original keys we can find out the changes about the file. ...
Advantages --The integrity of the data previously stored in cloud can still be verified even if the client's current secret key for cloud storage auditing is exposed. ...
doi:10.32628/ijsrst196250
fatcat:4b5txdyby5bbrirnxf2qu47zpu
Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage
2019
KSII Transactions on Internet and Information Systems
Furthermore, our scheme realizes traceability based on a secret sharing mechanism and supports dynamic user operations. ...
In order to tackle these issues simultaneously, in this paper, we propose a traceable dynamic public auditing scheme with identity privacy preserving for cloud storage. ...
Zheng and Li et al. proposed a signature scheme [32] - [33] for threshold tracking based on the idea that secret sharing scheme [34] can reconstruct secret. Huang et al. ...
doi:10.3837/tiis.2019.11.021
fatcat:2xgoptaiifftngemi4vso7e754
Blockchain-Based Fine-Grained Data Sharing for Multiple Groups in Internet of Things
2021
Security and Communication Networks
Therefore, in this paper, we propose a blockchain-based fine-grained data sharing scheme for multiple groups in cloud-based IoT systems. ...
Cloud-based Internet of Things, which is considered as a promising paradigm these days, can provide various applications for our society. ...
Audit(GPK): the algorithm is executed by any system user to verify data stored in cloud publicly. ...
doi:10.1155/2021/6689448
doaj:88dffb74c5b14558a0daee185d4e0e68
fatcat:zzgvkmzkfzb7rbfvcviweyj46e
A Quasigroup Encryption Based Remote Data Integrity Checking Protocol for Secured Online Storage Services
2012
International Journal of Scientific Research
from a shared pool of configurable computing resources. ...
Cloud computing has become one of the essential tools of computing as a utility, where users can remotely store their data into the cloud such that they can utilize high quality applications and services ...
It also provides facilities for users to develop, deploy and manage their applications on the cloud, which entails virtualization of resources that maintains and manages itself [5] . ...
doi:10.15373/22778179/feb2013/22
fatcat:qsu6j25mojgrrms7475kmhdhqi
Attribute Based Access to Scalable Media
2017
International Journal for Research in Applied Science and Engineering Technology
This requires flexible and accessible cryptographic key management to support difficult access policies. ...
In this paper Attribute-Based access to the media in the cloud where it uses cipher-text policy Attribute-Based Encryption (CP-ABE) technique to create an access control structure by using the algorithms ...
Cloud-based multimedia content sharing is one of the most significant services in cloud-based multimedia systems. ...
doi:10.22214/ijraset.2017.11054
fatcat:lx3n5uejzzaavpvl6ya2owvj5e
Integrity Check of Shared Data on Cloud with Various Mechanisms
2017
International Journal of Computer Applications
General Terms Cloud data, Data verifiability and User revocation ...
The aim of cloud processing is to allow users to take benefit from all of these solutions, without the need for deep information about or competence with each of them. ...
The TPA is able to publicly audit the integrity of the shared data in the cloud for the group. The group is an entity consisting of users, who create data and share with each other [12] . ...
doi:10.5120/ijca2017912945
fatcat:kfahqjcyuvhnzngjgn3pnme46i
Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage
2021
International Journal for Research in Applied Science and Engineering Technology
To share the encrypted files with various users, Cipher text-Policy Attribute-based writing (CP-ABE) might even be used to conduct fine-grained and owner-centric access management. ...
Many previous schemes did not grant the cloud provides the flexibility to verify whether or not or not a downloader can decipher. ...
The attacks can exist publicly clouds. ...
doi:10.22214/ijraset.2021.33513
fatcat:k7lcq43jvffdzooxjdogbzxani
« Previous
Showing results 1 — 15 out of 7,216 results