Journal ArticleDOI
Secured Sharing of Data in Cloud via Dual Authentication, Dynamic Unidirectional PRE, and CPABE
Reads0
Chats0
TLDR
The proposed methodology presented a secure privacy preserving data sharing with encryption technique called dynamic unidirectional proxy re-encryption (PRE) with cipher text policy attribute-based encryption that ensures the privacy, integrity, and security of the data while retrieving through the cloud.Abstract:
Cloud computing is an emergent computing paradigm; however, data security is a significant issue in recent time while outsourcing the data to the cloud preventing users to upload their data on cloud. The data forwarded to cloud can be protected using some cryptographic techniques based on identity, attributes, and prediction. But these algorithms lack their performance when a revoked user collude with cloud; therefore, it becomes essential to develop a secure data sharing framework with some enhanced cryptographic techniques. The proposed methodology presented a secure privacy preserving data sharing with encryption technique called dynamic unidirectional proxy re-encryption (PRE) with cipher text policy attribute-based encryption. The technique ensures the privacy, integrity, and security of the data while retrieving through the cloud. The framework is implemented in the cloud sim with java language. Experimental results proved that proposed frame work attains reasonable results compared to traditional methods.read more
Citations
More filters
Proceedings ArticleDOI
A Survey of Optimization Algorithms for Fog Computing Service Placement
TL;DR: This survey explores various optimization techniques to the application module placement, which includes Exact methods, Heuristic methods, Hybrid methods, and Hyper heuristic techniques on fog networks.
Proceedings ArticleDOI
A Survey of IoT Routing Protocols based on Security and Trust Management
TL;DR: This survey is analyzing weaknesses and threats in existing routing approaches as well as critical challenges in secure and trustworthy routing in IoT for future research.
Proceedings ArticleDOI
Predictive Analysis of Machine Learning Algorithms for Breast Cancer Diagnosis
TL;DR: This paper will be focusing on five of the popular supervised Machine Learning algorithms for Diagnosing Breast Cancer this will be K-Nearest Neighbors (KNN), Support Vector Machine (SVM), Random Forest (RF), Naïve Bayes (NB) and Decision Tree (DT) and the algorithm Random Forest gave the best results and the K Nearest Neighbor was the second best performing algorithm that produce desired results.
Proceedings ArticleDOI
The Need for Information Security Management for SMEs
TL;DR: In this article, the limitations faced by SMEs regarding ISM and how they can overcome them are explored, and the limitations of SMEs are discussed and the solutions to overcome these limitations are discussed.
References
More filters
Proceedings ArticleDOI
Ciphertext-Policy Attribute-Based Encryption
TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Proceedings ArticleDOI
Attribute-based encryption for fine-grained access control of encrypted data
TL;DR: This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.
Posted Content
Fuzzy Identity Based Encryption.
Amit Sahai,Brent Waters +1 more
TL;DR: In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Proceedings ArticleDOI
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
TL;DR: This paper addresses the problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re- Encryption.
Journal ArticleDOI
Addressing cloud computing security issues
TL;DR: This paper proposes introducing a Trusted Third Party, tasked with assuring specific security characteristics within a cloud environment, and presents a horizontal level of service, available to all implicated entities, that realizes a security mesh, within which essential trust is maintained.
Related Papers (5)
A secure cryptographic cloud communication using DNA cryptographic technique
Shruti Goyat,Sourabh Jain +1 more
Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing
Hu Xiong,Hao Zhang,Jianfei Sun +2 more