7,216 Hits in 4.4 sec

Publicly Verifiable Secret Sharing for Cloud-Based Key Management [chapter]

Roy D'Souza, David Jao, Ilya Mironov, Omkant Pandey
2011 Lecture Notes in Computer Science  
Security for our PKE supporting PVSS schemeIf a polynomial time adversary A wins the security game for PKE scheme supporting publicly verifiable secret-sharing scheme, then there exists a polynomial time  ...  If x is a leaf node then let y i ∈ SK S be the secret key corresponding to PP i where i = id(x).  ... 
doi:10.1007/978-3-642-25578-6_21 fatcat:h73eks4pkbhorkfhs77spn4thi

Secret shares to protect health records in Cloud-based infrastructures

William J Buchanan, Elochukwu Ukwandu, Nicole van Deursen, Lu Fan, Gordon Russell, Owen Lo, Christoph Thuemmler
2015 2015 17th International Conference on E-health Networking, Application & Services (HealthCom)  
This paper outlines a novel Cloud-based architecture (SECRET) which supports keyless encryption methods and which can be used for the storage of patient information, along with supporting failover and  ...  Increasingly health records are stored in cloudbased systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss.  ...  The PVSS is essentially a combination of secret sharing and publicly verifiable encryption. V.  ... 
doi:10.1109/healthcom.2015.7454589 dblp:conf/healthcom/BuchananUDFRLT15 fatcat:ztnrronlb5bxvndvlt2z4rv4xm

Security and Privacy Sustained Cloud Data Authentication using IDM

2015 International Journal of Science and Research (IJSR)  
In this paper, we propose a secure multiowner data sharing scheme for dynamic groups in the cloud.  ...  By aid of group signature and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others.  ...  One part of the key is stored with the user details in cloud which is used for traceability phase. Secret key is also used for signature generation and decryption process.  ... 
doi:10.21275/v4i11.sub159126 fatcat:2fhymi3xfzhqpijsjc4n6ckvlq

The Future Internet: A World of Secret Shares

William Buchanan, David Lanc, Elochukwu Ukwandu, Lu Fan, Gordon Russell, Owen Lo
2015 Future Internet  
The paper outlines a novel architecture: SECRET, which supports a robust cloud-based infrastructure with in-built privacy and failover.  ...  In order to understand the performance overhead of SECRET, the paper outlines a range of experiments that investigate the overhead of this and other secret share methods.  ...  Rabin's and Ben-Or's Publicly Verifiable Secret Sharing (PVSS) Some applications of a secret sharing scheme, such as e-auction, e-voting and multiparty computation, require public verifiability.  ... 
doi:10.3390/fi7040445 fatcat:7r3m2lw6jjbdzmy42vhx5ns4xq


2020 International journal for advanced research in science & technology  
In this paper, we look to address the unpredictable key administration challenge in cloud information uprightness checking by presenting fluffy personality based examining, the first in such a methodology  ...  We formalize the framework model and the security model for this new crude.  ...  Outsource key updates for cloud storage auditing with key-exposure resilience. Cloud storage auditing protocol with verifiable outsourcing of key updates.  ... 
doi:10.48047/ijarst/v10/i11/06 fatcat:h4mruxwojrgqpcyjfxrk46of5q

Security and Privacy Challenges in Cloud Computing Environments

Hassan Takabi, James B.D. Joshi, Gail-Joon Ahn
2010 IEEE Security and Privacy  
Cloud computing provides an economical and efficient solution for sharing group resources among cloud users.  ...  User revocation list is performed by group manager and it is given to the cloud service provider to check the active users within the group before giving access to the cloud.  ...  Public key for encrypting the data and private key is kept secret and is used for decrypting the data files.  ... 
doi:10.1109/msp.2010.186 fatcat:oyqbvlgbzfb55fankcm7xhcsqq

Cloud Data Sharing in a Dynamic Group with a Dual Secure Technology

Ravi C.B, Mohan K
2014 IOSR Journal of Computer Engineering  
In this paper, we propose a secure multiowner data sharing scheme for dynamic groups in the cloud.  ...  By aid of group signature and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others.  ...  We also convey our thanks to all the staff members of SIT for helping in the project.  ... 
doi:10.9790/0661-162107073 fatcat:teuhr62bijeebjvyx4v62iywya

Robust and Simple N-Party Entangled Authentication Cloud Storage Protocol Based on Secret Sharing Scheme

Hongfeng Zhu, Tianhua Liu, Dan Zhu, Haiyang Li
2013 Journal of Information Hiding and Multimedia Signal Processing  
Its main idea is to use entangled method for designing a scheme which has four key policies: (i) N-clients can easily entangle their files into a single secret c to be store by a cloud storage provider  ...  Entangled cloud storage schemes think in different ways with traditional cloud storage secure schemes which provide high level security to force cloud storage servers for treating equally between normal  ...  derivation tree to organize and manage keys which are pushed to DHT (Distributed Hash Table) network after partitioned by secret sharing scheme.  ... 
dblp:journals/jihmsp/ZhuLZL13 fatcat:hlx35t3bn5chdbgxdcn45tyc7u

Proficient Justification of Data Accuracy for Cloud Storage Using Dual Protection

Deepika. N, Durga. P, Gayathri. N, Murugesan. M
2019 International Journal of Scientific Research in Science and Technology  
At the time of download key generated (code based key generation) and it will send to the file owner.  ...  In our system we are using the own auditing based on the token generation. Using this key generation technique compare the key values from original keys we can find out the changes about the file.  ...  Advantages --The integrity of the data previously stored in cloud can still be verified even if the client's current secret key for cloud storage auditing is exposed.  ... 
doi:10.32628/ijsrst196250 fatcat:4b5txdyby5bbrirnxf2qu47zpu

Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage

2019 KSII Transactions on Internet and Information Systems  
Furthermore, our scheme realizes traceability based on a secret sharing mechanism and supports dynamic user operations.  ...  In order to tackle these issues simultaneously, in this paper, we propose a traceable dynamic public auditing scheme with identity privacy preserving for cloud storage.  ...  Zheng and Li et al. proposed a signature scheme [32] - [33] for threshold tracking based on the idea that secret sharing scheme [34] can reconstruct secret. Huang et al.  ... 
doi:10.3837/tiis.2019.11.021 fatcat:2xgoptaiifftngemi4vso7e754

Blockchain-Based Fine-Grained Data Sharing for Multiple Groups in Internet of Things

Teng Li, Jiawei Zhang, Yangxu Lin, Shengkai Zhang, Jianfeng Ma
2021 Security and Communication Networks  
Therefore, in this paper, we propose a blockchain-based fine-grained data sharing scheme for multiple groups in cloud-based IoT systems.  ...  Cloud-based Internet of Things, which is considered as a promising paradigm these days, can provide various applications for our society.  ...  Audit(GPK): the algorithm is executed by any system user to verify data stored in cloud publicly.  ... 
doi:10.1155/2021/6689448 doaj:88dffb74c5b14558a0daee185d4e0e68 fatcat:zzgvkmzkfzb7rbfvcviweyj46e

A Quasigroup Encryption Based Remote Data Integrity Checking Protocol for Secured Online Storage Services

N. Saranya N. Saranya, Dr.V.Thiagarasu Dr.V.Thiagarasu
2012 International Journal of Scientific Research  
from a shared pool of configurable computing resources.  ...  Cloud computing has become one of the essential tools of computing as a utility, where users can remotely store their data into the cloud such that they can utilize high quality applications and services  ...  It also provides facilities for users to develop, deploy and manage their applications on the cloud, which entails virtualization of resources that maintains and manages itself [5] .  ... 
doi:10.15373/22778179/feb2013/22 fatcat:qsu6j25mojgrrms7475kmhdhqi

Attribute Based Access to Scalable Media

Mr. Lokesh khubalkar
2017 International Journal for Research in Applied Science and Engineering Technology  
This requires flexible and accessible cryptographic key management to support difficult access policies.  ...  In this paper Attribute-Based access to the media in the cloud where it uses cipher-text policy Attribute-Based Encryption (CP-ABE) technique to create an access control structure by using the algorithms  ...  Cloud-based multimedia content sharing is one of the most significant services in cloud-based multimedia systems.  ... 
doi:10.22214/ijraset.2017.11054 fatcat:lx3n5uejzzaavpvl6ya2owvj5e

Integrity Check of Shared Data on Cloud with Various Mechanisms

Sarika Katkade, J. V.
2017 International Journal of Computer Applications  
General Terms Cloud data, Data verifiability and User revocation  ...  The aim of cloud processing is to allow users to take benefit from all of these solutions, without the need for deep information about or competence with each of them.  ...  The TPA is able to publicly audit the integrity of the shared data in the cloud for the group. The group is an entity consisting of users, who create data and share with each other [12] .  ... 
doi:10.5120/ijca2017912945 fatcat:kfahqjcyuvhnzngjgn3pnme46i

Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage

V. S. Sureshkumar
2021 International Journal for Research in Applied Science and Engineering Technology  
To share the encrypted files with various users, Cipher text-Policy Attribute-based writing (CP-ABE) might even be used to conduct fine-grained and owner-centric access management.  ...  Many previous schemes did not grant the cloud provides the flexibility to verify whether or not or not a downloader can decipher.  ...  The attacks can exist publicly clouds.  ... 
doi:10.22214/ijraset.2021.33513 fatcat:k7lcq43jvffdzooxjdogbzxani
« Previous Showing results 1 — 15 out of 7,216 results