Journal ArticleDOI
Context-aware access control and anonymous authentication in WBAN
TLDR
This paper proposes a context-aware access control and anonymous authentication approach based on a secure and efficient Hybrid Certificateless Signcryption (H-CLSC) scheme that incorporates the merits of Ciphertext-Policy Attribute-Based Signcrypted and Identity-Based Broadcast Signc encryption in order to meet the security requirements and provide adaptive contextual privacy.About:
This article is published in Computers & Security.The article was published on 2020-01-01. It has received 26 citations till now. The article focuses on the topics: Signcryption & Access control.read more
Citations
More filters
Journal ArticleDOI
Secure and Efficient Data Aggregation for IoT Monitoring Systems
TL;DR: A novel cryptographic accumulator based on the novel authenticated additive homomorphic encryption which can collect and accumulate data from IoT wireless wearable devices and can be used for analysis in an encrypted form so that the information is not revealed.
Journal ArticleDOI
PAASH: A privacy-preserving authentication and fine-grained access control of outsourced data for secure smart health in smart cities
TL;DR: An analysis of PAASH reveals that it can provide desirable privacy and security measures in smart health and the formal security demonstrated in the random oracle model (ROM) shows that PAASH is semantically secure under the intractability of the Discrete Logarithm Problem (DLP).
Journal ArticleDOI
Context-based Co-presence detection techniques: A survey
TL;DR: A systematic survey on the contextual information based proximity detection techniques, commonly referred as Contextual Co-presence (COCO) protocols, which includes a discussion on the possible adversary and communication models along with the existing security attacks on ZICDA systems.
Journal ArticleDOI
SAMAKA: Secure and Anonymous Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks
TL;DR: A secure and anonymous mutual authentication scheme for WBANs (SAMAKA) is propounded that preserves all the desired security features and guards from various security attacks from an adversary and is proved to be provably secure in the RoR Model.
Proceedings ArticleDOI
A Proposed Access Control-Based Privacy Preservation Model to Share Healthcare Data in Cloud
TL;DR: The concept of an access control-based (AC) privacy preservation model for the mutual authentication of users and data owners in the proposed digital system offers a high-security guarantee and high efficiency.
References
More filters
Book ChapterDOI
Fuzzy identity-based encryption
Amit Sahai,Brent Waters +1 more
TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Posted Content
Fuzzy Identity Based Encryption.
Amit Sahai,Brent Waters +1 more
TL;DR: In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Journal ArticleDOI
Wireless Body Area Networks: A Survey
TL;DR: The current state-of-art of WBANs is surveyed based on the latest standards and publications, and open issues and challenges within each area are explored as a source of inspiration towards future developments inWBANs.
Journal ArticleDOI
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
TL;DR: A novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semitrusted servers are proposed and a high degree of patient privacy is guaranteed simultaneously by exploiting multiauthority ABE.
Journal ArticleDOI
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications
TL;DR: This paper proposes an efficient and privacy-preserving aggregation scheme, named EPPA, for smart grid communications that resists various security threats and preserve user privacy, and has significantly less computation and communication overhead than existing competing approaches.