scispace - formally typeset
Search or ask a question
Topic

Trusted third party

About: Trusted third party is a research topic. Over the lifetime, 2919 publications have been published within this topic receiving 60935 citations.


Papers
More filters
Proceedings ArticleDOI
01 Oct 2017
TL;DR: This paper investigates the LoRaWAN IoT architecture, evaluating its security by gathering possible attacks that can be launched on it, using the Scyther tool, and proposes an enhanced version of the Lo RaWAN architecture that solves those attacks.
Abstract: The Internet of things (IoT) is pervading our lives to allow a comfortable and smarter human living space by connecting surrounding human things to the Internet. But, it reveals sensitive and private data as well as human appliances to intruders. To solve these problems, security solutions based on cryptography might be used. But, these solutions are based on encryption keys that must be managed securely and properly while taking into account the IoT characteristics. In this paper, we investigate the LoRaWAN IoT architecture. We evaluate its security by gathering possible attacks that can be launched on it, using the Scyther tool. Then, we propose an enhanced version of the LoRaWAN architecture that solves those attacks. We evaluate the proposed solution in terms of security and key management requirements and compare it to existing solutions.

25 citations

Posted Content
TL;DR: Extensive experimental results on a variety of vertically partitioned datasets not only verify the theoretical results of AFSGD-VP and its SVRG and SAGA variants, but also show that the algorithms have much higher efficiency than the corresponding synchronous algorithms.
Abstract: The privacy-preserving federated learning for vertically partitioned data has shown promising results as the solution of the emerging multi-party joint modeling application, in which the data holders (such as government branches, private finance and e-business companies) collaborate throughout the learning process rather than relying on a trusted third party to hold data. However, existing federated learning algorithms for vertically partitioned data are limited to synchronous computation. To improve the efficiency when the unbalanced computation/communication resources are common among the parties in the federated learning system, it is essential to develop asynchronous training algorithms for vertically partitioned data while keeping the data privacy. In this paper, we propose an asynchronous federated SGD (AFSGD-VP) algorithm and its SVRG and SAGA variants on the vertically partitioned data. Moreover, we provide the convergence analyses of AFSGD-VP and its SVRG and SAGA variants under the condition of strong convexity. We also discuss their model privacy, data privacy, computational complexities and communication costs. To the best of our knowledge, AFSGD-VP and its SVRG and SAGA variants are the first asynchronous federated learning algorithms for vertically partitioned data. Extensive experimental results on a variety of vertically partitioned datasets not only verify the theoretical results of AFSGD-VP and its SVRG and SAGA variants, but also show that our algorithms have much higher efficiency than the corresponding synchronous algorithms.

25 citations

Journal ArticleDOI
TL;DR: This paper presents a secure and trusted data sharing framework based on attribute-based encryption (ABE), searchable encryption, and blockchain, and transfers the related calculation of ciphertext retrieval to blockchain for credible execution without relying on any trusted third party.

24 citations

Journal ArticleDOI
TL;DR: A new distributed scheme for media content sharing on online social networks that may minimize users’ privacy exposure, through automated procedures and is a step towards enabling OSNs to interact, exchange information with equal rights, independently of their size, focus and underlying infrastructure.

24 citations

Proceedings ArticleDOI
30 Oct 2010
TL;DR: This paper proposes an architecture to facilitate the integration of security requirements in the cloud environment and to address the legal issues attached and customizes the selection of a service provider based on the companies preference.
Abstract: Cloud Computing as a service on demand architecture has become a topic of interest in the last few years. The outsourcing of duties and infrastructure to external parties enables new services to be established quickly and with low financial risk. These services also can be scaled on demand. Nevertheless, several issues such as security and legality should be considered before entering the cloud. The financial benefits of cloud services conflict with the need to secure and control the access to outsourced information. Companies have to comply with diverse laws across jurisdictions and are accountable to various national regulators. Security requirements may not be compatible with those offered by existing providers. In this paper, we propose an architecture to facilitate the integration of these security requirements in the cloud environment and to address the legal issues attached. Our approach customizes the selection of a service provider based on the companies preference. We also define a trusted third party to handle the monitoring and auditing processes over different service providers.

24 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Server
79.5K papers, 1.4M citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
84% related
Mobile computing
51.3K papers, 1M citations
83% related
Network packet
159.7K papers, 2.2M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202321
202240
2021125
2020201
2019179
2018177