scispace - formally typeset
Search or ask a question
Topic

Trusted third party

About: Trusted third party is a research topic. Over the lifetime, 2919 publications have been published within this topic receiving 60935 citations.


Papers
More filters
Proceedings ArticleDOI
12 Nov 2015
TL;DR: Through simulations, it is shown that QoE-based service provisioning in a vehicular cloud fulfils the service requirements by making a compromise between delay, service cost and information revealed to the TTP.
Abstract: Recently, Vehicular Cloud Computing (VCC) are promising to convey relatively more communication, on-demand and based on pay-as-you-go fashion. Such environment concept's is being widely adopted, which is resulting in several research issues and challenges. Privacy, service cost and provisioning delay are identified as the most crucial challenges to be addressed. This paper extends our previous work [10] and builds a generalized of quality-of-experience (QoE) design. QoE requirements are collected via numerous vehicular nodes in the vehicular cloud and re-formulated by a weighted combination of these factors, i.e., delay, price and information revealed to the Trusted Third Party (TTP). Extensive simulations are run in order to evaluate the performance of our proposed framework. Through simulations, we show that QoE-based service provisioning in a vehicular cloud fulfils the service requirements by making a compromise between delay, service cost and information revealed to the TTP.

17 citations

Journal ArticleDOI
TL;DR: This paper came up with a computationally productive and safer anonymous authentication pattern for cloud users through which the trusted third party (TTP) can revoke the cloud users or service providers from the cloud environment.
Abstract: In cloud computing, the combinations of various computing units are globally separated, however, electronically connected. In recent years, the number of cloud users has adequately increased in the modern societies. In order to restrict the illegal access of the intruders, a strong user authentication is required for cloud computing environment. In this regard, in this paper, we came up with a computationally productive and safer anonymous authentication pattern for cloud users. Moreover, in our scheme, mutual authentication is performed in an anonymous way between the cloud user and the cloud server to strongly verify the legitimacy of each user before providing an access into the cloud. After the successful anonymous mutual authentication, the targeted cloud service provider and the cloud users make mutual communication between them. In case of any misbehaviouring after successful mutual authentication, an efficient revocation mechanism is proposed through which the trusted third party (TTP) can revoke the cloud users or service providers from the cloud environment. Even though there were many anonymous cloud computing authentication schemes, the previously proposed authentication schemes suffered from high computational cost during certificate verification. Moreover, the section related to analysis proves that the explained scheme is robust enough in terms of security strength to avoid various security attacks and breeches.

17 citations

Journal ArticleDOI
TL;DR: This work proposes a privacy-preserving aggregation protocol that obfuscates individual consumption readings, while at the same time allows their aggregation without loss of accuracy, and shows that knowledge of the obfuscated values does not affect customer privacy.

17 citations

Book ChapterDOI
28 May 2003
TL;DR: A so-called trust matrix model to build trust for conducting first trade transactions in electronic commerce; i.e. transactions in an electronic commerce environment between two parties that have never conducted trade transactions between them before is proposed.
Abstract: We propose a so-called trust matrix model to build trust for conducting first trade transactions in electronic commerce; i.e. transactions in an electronic commerce environment between two parties that have never conducted trade transactions between them before. The trust matrix model is based on the idea that for business-to-business electronic commerce a balance has to be found between anonymous procedural trust, i.e. procedural solutions for trust building, and personal trust based on positive past experiences within an existing business relation. Procedural trust building solutions are important for first trade situations, because of the lack of experience in these situations. The procedural trust solutions are related to the notion of institution-based trust, because the trust in the procedural solutions depends on the trust one has in the institutions that issued or enforces the procedure. The trust matrix model can be used as a tool to analyze and develop trust-building services to help organizations conduct first-trade electronic commerce transactions.

17 citations

Journal ArticleDOI
TL;DR: The unlinkability property to anonymous accesses together with a tracing facility to existing proposals is added, which allows for anonymity revocation and tracing of unlinkable accesses.
Abstract: Purpose – To provide a cryptographic protocol for anonymously accessing services offered on the web. Such anonymous accesses can be disclosed or traced under certain conditions.Design/methodology/approach – The “traceable signature” scheme was used in conjunction with the “privilege management infrastructure”.Findings – The cryptographic primitive provides a suitable tool for anonymous and unlinkable access to web resources based on the privileges that users hold. Moreover, the scheme allows for anonymity revocation and tracing of unlinkable accesses.Research limitations/implications – The power of the attribute authority should be divided into several entities, one of them being a trusted third party, to avoid illicit disclosing of information.Practical implications – New systems with support for anonymous access to web resources can be developed.Originality/value – This paper adds the unlinkability property to anonymous accesses together with a tracing facility to existing proposals.

17 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Server
79.5K papers, 1.4M citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
84% related
Mobile computing
51.3K papers, 1M citations
83% related
Network packet
159.7K papers, 2.2M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202321
202240
2021125
2020201
2019179
2018177