Modified SeDaSc system for efficient data sharing in the cloud

Author(s):  
Marwa F. Areed ◽  
Mohamed M. Rashed ◽  
Nehal Fayez ◽  
Ehab H. Abdelhay
Keyword(s):  
2021 ◽  
pp. 1-12
Author(s):  
Jiawei Zhang ◽  
Teng Li ◽  
Mohammad S. Obaidat ◽  
Chi Lin ◽  
Jianfeng Ma

2018 ◽  
Vol 8 (12) ◽  
pp. 2519
Author(s):  
Wei Li ◽  
Wei Ni ◽  
Dongxi Liu ◽  
Ren Liu ◽  
Shoushan Luo

With the rapid development of cloud computing, it is playing an increasingly important role in data sharing. Meanwhile, attribute-based encryption (ABE) has been an effective way to share data securely in cloud computing. In real circumstances, there is often a mutual access sub-policy in different providers’ access policies, and the significance of each attribute is usual diverse. In this paper, a secure and efficient data-sharing scheme in cloud computing, which is called unified ciphertext-policy weighted attribute-based encryption (UCP-WABE), is proposed. The weighted attribute authority assigns weights to attributes depending on their importance. The mutual information extractor extracts the mutual access sub-policy and generates the mutual information. Thus, UCP-WABE lowers the total encryption time cost of multiple providers. We prove that UCP-WABE is selectively secure on the basis of the security of ciphertext-policy weighted attribute-based encryption (CP-WABE). Additionally, the results of the implementation shows that UCP-WABE is efficient in terms of time.


Sensors ◽  
2020 ◽  
Vol 20 (11) ◽  
pp. 3141
Author(s):  
Byeong-Gyu Jeong ◽  
Taek-Young Youn ◽  
Nam-Su Jho ◽  
Sang Uk Shin

Currently, “connected cars” are being actively designed over smart cars and autonomous cars, to establish a two-way communication network between the vehicle and all infrastructure. Additionally, because vehicle black boxes are becoming more common, specific processes for secure and efficient data sharing and transaction via vehicle networks must be developed. In this paper, we propose a Blockchain-based vehicle data marketplace platform model, along with a data sharing scheme, using Blockchain-based data-owner-based attribute-based encryption (DO-ABE). The proposed model achieves the basic requirements such as data confidentiality, integrity, and privacy. The proposed system securely and effectively handles large-capacity and privacy-sensitive black box video data by storing the metadata on Blockchain (on-chain) and encrypted raw data on off-chain (external) storage, and adopting consortium Blockchain. Furthermore, the data owners of the proposed model can control their own data by applying the Blockchain-based DO-ABE and owner-defined access control lists.


2020 ◽  
Vol 5 (19) ◽  
pp. 26-31
Author(s):  
Md. Farooque ◽  
Kailash Patidar ◽  
Rishi Kushwah ◽  
Gaurav Saxena

In this paper an efficient security mechanism has been adopted for the cloud computing environment. It also provides an extendibility of cloud computing environment with big data and Internet of Things. AES-256 and RC6 with two round key generation have been applied for data and application security. Three-way security mechanism has been adopted and implemented. It is user to user (U to U) for data sharing and inter cloud communication. Then user to cloud (U to C) for data security management for application level hierarchy of cloud. Finally, cloud to user (C to U) for the cloud data protection. The security analysis has been tested with different iterations and rounds and it is found to be satisfactory.


Author(s):  
Sejal Atit Bhavsar ◽  
Brinda Yeshu Pandit ◽  
Kirit J. Modi

Internet of things has gathered significance within the latest technology domain and trends. As a result, it offers greater ways of accessing data and utilizing intelligent systems. IoT applications are developed for specific scenarios (i.e., smart home, smart transportation, smart agriculture, e-health, etc.). Such IoT applications are inefficient for sharing data and knowledge through services. This results in an inefficient exploitation of different IoT service applications. Social internet of things (SIoT) has efficient and effective ways to support these kinds of services. A concept of social internet of things has been proposed in this chapter in order to support efficient data sharing. This chapter explores related work and literature study on social internet of things, concentrates on mapping IoT with SIoT, and describes a possible architecture for SIoT, components, layers and processes of SIoT. It also illustrates applications, where SIoT can be used, and at the end, the authors provide a few challenges related to SIoT.


Sign in / Sign up

Export Citation Format

Share Document