Filters








3,200 Hits in 3.6 sec

Traceable and Retrievable Identity-Based Encryption [chapter]

Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang
Applied Cryptography and Network Security  
Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007.  ...  Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007.  ...  Acknowledgements We would like to thank the anonymous reviewers of ACNS 2008 for their suggestions and invaluable comments to improve this paper.  ... 
doi:10.1007/978-3-540-68914-0_6 dblp:conf/acns/AuHLSWY08 fatcat:xirzxnzckra5bpu7tks5h3f4ka

Security and Privacy Sustained Cloud Data Authentication using IDM

2015 International Journal of Science and Research (IJSR)  
So a Steganography is introducing in cloud storage centre where the group member encrypt the data and send it to the cloud server, the server receive it and hide it in to an image.  ...  Data of the different owners in the group shares data with each other securely and preserving their identity from an untrusted cloud server is one of the challenging issues currently, due to the frequent  ...  Before generating a file group member first retrieve the revocation list from the cloud validate it and based on the number of revoked user group member can encrypt the file.  ... 
doi:10.21275/v4i11.sub159126 fatcat:2fhymi3xfzhqpijsjc4n6ckvlq

A Study on the Public Auditing Mechanisms for Privacy Preserving and Maintaining Data Integrity in Cloud Computing

V. Saranya, R.G. Suresh Kumar, T. Nalini
2016 International Journal of Database Theory and Application  
We have presented the advantages and flaws in each mechanism compared to another.  ...  The users store their information in remote location with the hope of maintaining the privacy and integrity of data.  ...  Acknowledgements We are grateful and thankful to the CARD research system of our college.  ... 
doi:10.14257/ijdta.2016.9.6.10 fatcat:zuozwxhk45ajdee76jihrrczdq

Privacy-Preserving Attribute-Based Keyword Search with Traceability and Revocation for Cloud-Assisted IoT

Kai Zhang, Yanping Li, Laifeng Lu, Qing Yang
2021 Security and Communication Networks  
Attribute-based keyword search (ABKS) has been regarded as a promising solution to ensure data confidentiality and fine-grained search control for cloud-assisted IoT.  ...  Towards this end, we present a privacy-preserving ABKS that simultaneously supports policy hiding, malicious user traceability, and revocation.  ...  Attributed-Based Encryption.  ... 
doi:10.1155/2021/9929663 fatcat:icundoqwlzesnphuxve6slzncu

Cloud Data Sharing in a Dynamic Group with a Dual Secure Technology

Ravi C.B, Mohan K
2014 IOSR Journal of Computer Engineering  
So a steganography is introducing in cloud storage centre where the group member encrypt the data and send it to the cloud server, the server receive it and hide it in to an image.  ...  Data of the different owners in the group shares data with each other securely and preserving their identity from an untrusted cloud server is one of the challenging issues currently, due to the frequent  ...  Shiva Kumar G.S, Dept. of Computer Science and Engineering, SIT Mangalore. We also convey our thanks to all the staff members of SIT for helping in the project.  ... 
doi:10.9790/0661-162107073 fatcat:teuhr62bijeebjvyx4v62iywya

BCST-APTS: Blockchain and CP-ABE Empowered Data Supervision, Sharing, and Privacy Protection Scheme for Secure and Trusted Agricultural Product Traceability System

Guofeng Zhang, Xiao Chen, Bin Feng, Xuchao Guo, Xia Hao, Henggang Ren, Chunyan Dong, Yanan Zhang, Yuling Chen
2022 Security and Communication Networks  
We propose a secure and trusted agricultural product traceability system (BCST-APTS), which is supported by blockchain and CP-ABE encryption technology.  ...  Furthermore, a reencryption scheme based on ciphertext-policy attribute encryption (RE-CP-ABE) is proposed, which can meet the needs of efficient supervision and sharing of ciphertext data.  ...  For example, the data issuer retrieves the attributes used for data encryption, and when the authoritative organization works in place of the CA, it can generate encryption keys based on the data issuer  ... 
doi:10.1155/2022/2958963 fatcat:jftt2mz76vcdrffhx75f3fq7fe

Large Universe CP-ABE With Whitebox Traceability

Anusha Sivanandhan, Angel M Eldhose
2016 International Journal on Cybernetics & Informatics  
KEYWORDS Attribute-based encryption,ciphertext-policy,large universe ,white-box traceability,malicious user.  ...  In a ciphertext-policy attribute-based encryption (CP-ABE) system, decryption keys are defined over attributes shared by multiple users.  ...  Sahai and Waters introduced the notion of Fuzzy Identity-Based Encryption[36].  ... 
doi:10.5121/ijci.2016.5222 fatcat:dw5j5gnot5dqfnjasnez6wbxty

A Review on Cloud Data Security and its Mitigation Techniques

K. Selvamani, S. Jayanthi
2015 Procedia Computer Science  
Cloud users are allowed to store their data in cloud server using cloud storage and reduce the burden of storing and retrieving in local machine.  ...  In this paper, the methodologies as encryption based methods and auditability schemes are used.  ...  Traceability A group manager can open signature on some special situation and trace the issue related to user. Tracing can be categorized into two ways, data traceability and operation traceability.  ... 
doi:10.1016/j.procs.2015.04.192 fatcat:tawpw3p2izhc3elenwn5c23aai

Improving Security of Traceable White-Box CPABE with TTP Access Control

2015 International Journal of Science and Research (IJSR)  
Various encryption schemes have gained popularity for secure transmission of data. CPABE (Ciphertext Policy Attribute Based Encryption) is one among such schemes.  ...  The decryption rights are generated based on the attributes of user. Traceability is the property by which the malicious users who intentionally try to leak the data are traced.  ...  Related Work CPABE Ciphertext Policy Attribute Based Encryption is an encryption method which uses policies of user to generate encryption and decryption keys.  ... 
doi:10.21275/v4i11.nov151381 fatcat:o7m2yjh4xrgaphpa2vls3rtoj4

An Efficient Public Auditing with Privacy Preserving Identity and Traceability

Nitesh Kumar, Sachin D.
2016 International Journal of Computer Applications  
This paper proposed architecture for privacy preservation and traceability. The implementation results represent that our method is suitable for large organizations.  ...  Since these data-centers may be located in any part of the world beyond the reach and control of users, there are multifarious security and privacy challenges that need to be understood and addressed.  ...  Most of the encryption technique regarding encryption for cloud-based database services are inappropriate to the database prototype.  ... 
doi:10.5120/ijca2016911499 fatcat:gtgaymzuizbgjpdyzk4xb5qmuy

A Survey on Identity-Based Authenticated and Efficient Traceable Search System

Shital Khandare, Prof.H.A. Hingoliwala
2018 IJARCCE  
Secure search over encrypted remote data is crucial in cloud computing to ensure the data privacy and usability.  ...  The key escrow free mechanism can be used which will effectively prevent the Key Generation Centre (KGC) from unscrupulously searching and decrypting all encrypted files of users.  ...  CONCLUSION AND FUTURE WORK This dissertation proposed a novel method Identity-based Authenticated and Efficient Traceable Search System for Secure Cloud Storage.  ... 
doi:10.17148/ijarcce.2018.7106 fatcat:pxtkeczkrndu3j3zqkiknesure

Lightweight Sharable and Traceable Secure Mobile Health System

Yang Yang, Ximeng Liu, Robert H. Deng, Yingjiu Li
2017 IEEE Transactions on Dependable and Secure Computing  
In this paper, we propose a Lightweight Sharable and Traceable (LiST) secure mobile health system in which patient data are encrypted end-to-end from a patient's mobile device to data users.  ...  then uploading the encrypted data to the cloud for storage and access by healthcare staff and researchers.  ...  Data Retrieval Receiving the data retrieval request from data user, the public cloud server responds on the request and searches on the stored encrypted EHRs to look for matching files.  ... 
doi:10.1109/tdsc.2017.2729556 fatcat:74cfh2ury5gztm2r6r4hxo46e4

A Survey on the Applications of Blockchains in Security of IoT Systems [article]

Zulfiqar Ali Khan, Akbar Siami Namin
2021 arXiv   pre-print
A critical concern is the security and integrity of such a complex platform to ensure the sustainability and reliability of these IoT-based systems.  ...  Blockchain is an emerging technology that has demonstrated its unique features and capabilities for different problems and application domains including IoT-based systems.  ...  Furthermore, the traceability aspect incorporates information assigned to the product related to its identity, processing, and usefulness [15] .  ... 
arXiv:2112.09296v1 fatcat:bempf3xzrjb7hc5zngmliyqgbe

An efficient traceable access control scheme with reliable key delegation in mobile cloud computing

Zhitao Guan, Jing Li, Ying Zhang, Ruzhi Xu, Zhuxiao Wang, Tingting Yang
2016 EURASIP Journal on Wireless Communications and Networking  
Secondly, a new type of re-encryption method is proposed, which is based on an intuitive method that supports any monotonic access tree instead of the re-encryption key.  ...  Firstly, we present a traceable CP-ABE system and realize key delegation without loss of traceability.  ...  Related work Attribute-based encryption (ABE) is firstly proposed by Sahai and Brent in [12] .  ... 
doi:10.1186/s13638-016-0705-2 fatcat:7ogt2jujcrcl3bt2ybsyqpzs2q

Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System

2021 KSII Transactions on Internet and Information Systems  
In the system of ciphertext policy attribute-based encryption (CP-ABE), only when the attributes of data user meets the access structure established by the encrypter, the data user can perform decryption  ...  and supports arbitrary monotonous access structures.  ...  Related Work ABE is evolved from fuzzy identity-based encryption [15] . After that, many ABE schemes were put forward to improve performance and security.  ... 
doi:10.3837/tiis.2021.01.017 fatcat:xoh5m75bnjf5ppvxi34izfazra
« Previous Showing results 1 — 15 out of 3,200 results