Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud

2017 ◽  
Vol 66 (5) ◽  
pp. 891-904 ◽  
Author(s):  
Sikhar Patranabis ◽  
Yash Shrivastava ◽  
Debdeep Mukhopadhyay
2019 ◽  
Vol 62 (12) ◽  
pp. 1748-1760 ◽  
Author(s):  
Yang Chen ◽  
Wenmin Li ◽  
Fei Gao ◽  
Wei Yin ◽  
Kaitai Liang ◽  
...  

AbstractOnline data sharing has become a research hotspot while cloud computing is getting more and more popular. As a promising encryption technique to guarantee the security shared data and to realize flexible fine-grained access control, ciphertext-policy attribute-based encryption (CP-ABE) has drawn wide attentions. However, there is a drawback preventing CP-ABE from being applied to cloud applications. In CP-ABE, the access structure is included in the ciphertext, and it may disclose user’s privacy. In this paper, we find a more efficient method to connect ABE with inner product encryption and adopt several techniques to ensure the expressiveness of access structure, the efficiency and security of our scheme. We are the first to present a secure, efficient fine-grained access control scheme with hidden access structure, the access structure can be expressed as AND-gates on multi-valued attributes with wildcard. We conceal the entire attribute instead of only its values in the access structure. Besides, our scheme has obvious advantages in efficiency compared with related schemes. Our scheme can make data sharing secure and efficient, which can be verified from the analysis of security and performance.


2014 ◽  
Vol 19 (4) ◽  
pp. 398-405 ◽  
Author(s):  
Liang-liang Wang ◽  
Ke-fei Chen ◽  
Xian-ping Mao ◽  
Yong-tao Wang

2019 ◽  
Author(s):  
Sophia C. Tintori ◽  
Patrick Golden ◽  
Bob Goldstein

AbstractAs the scientific community becomes increasingly interested in data sharing, there is a growing need for tools that facilitate the querying of public data. Mining of RNA-seq datasets, for example, has value to many biomedical researchers, yet is often effectively inaccessible to non-genomicist experts, even when the raw data are available. Here we present DrEdGE (dredge.bio.unc.edu), a free Web-based tool that facilitates data sharing between genomicists and their colleagues. The DrEdGE software guides genomicists through easily creating interactive online data visualizations, which colleagues can then explore and query according to their own conditions to discover genes, samples, or patterns of interest. We demonstrate DrEdGE’s features with three example websites we generated from publicly available datasets—human neuronal tissue, mouse embryonic tissue, and a C. elegans embryonic series. DrEdGE increases the utility of large genomics datasets by removing the technical obstacles that prevent interested parties from exploring the data independently.


2018 ◽  
Vol 7 (3.27) ◽  
pp. 36
Author(s):  
E Amarnath Reddy ◽  
M Srinuvasa Reddy ◽  
Kompally Manisha ◽  
B Mamatha

Cloud has become a crucial part of our day to day life because of its easy, effortless and straightforward nature of data storing and sharing. One of the important concerns for many users is data storing, we mustn’t forget about data sharing. A convenient way of online data sharing is to look at its pros for simple access while preserving security are cons for any user. Thus, a better way of ensuring user’s data is to implement data integrity with the KAC scheme. This scheme provides an efficient sharing method of decrypting multiple sets of data with the single key. It’s one among many ways of quick and effective data retrieval in case of data loss or data alteration on the cloud. It also uses the broadcast algorithm to distribute data for a specific set of users. This scheme uses basic HMAC, one of the secure hash functions for the stability of data integrity.  Therefore provides a protected environment where a user can share the bulk of data through integrity. Another advantage of using this scheme could reduce the burden of computation over the cloud.       


2018 ◽  
Vol 7 (2.4) ◽  
pp. 200
Author(s):  
T Senthil Kumar ◽  
S Prabhakaran ◽  
V Prashanth

Authentication is the process of verifying that the users who they claim to be or not, it is based on identity and credentials. Most of the attacks can be reduced using authentication process. Authentication is important because as the amount of online data sharing has increased, threats and fraud in a large amount are also increased, a changing of the guard which provides security to mobile devices is needed for which authentication is necessary. Privacy of user’s location is important in mobile networks, there are several strategies to protect the personal information (i.e., their location). In previous work it is introduced that the mix zone model which will change the old pseudonyms to new pseudonyms and anonymizes user’s identity by restricting the position where users can be located. Later work, even in the multiple mix-zones model, attackers can attack by using side information (like footprints, navigation etc.). So, we need an authentication protocol while two mix-zones or user-services are communicating. We came across different authentication protocols like PAP, CHAP, and EAP. In this paper, a four-way handshake protocol is implemented for providing authentication while multiple mix-zones are communicating. A four-way handshake authentication protocol i.e., WPA-PSK protocol for verification. WPA-PSK is applied in such a way that both STA(supplicant) and AP(authenticator) can check that they are re-agreeing on a non-forged RSN and IE, therefore they are using the most secure available protocols. 


2020 ◽  
Vol 130 ◽  
pp. 104731 ◽  
Author(s):  
Tian Gan ◽  
David G. Tarboton ◽  
Pabitra Dash ◽  
Tseganeh Z. Gichamo ◽  
Jeffery S. Horsburgh

2016 ◽  
Vol 11 (1) ◽  
pp. 118-127 ◽  
Author(s):  
Stephen Abrams ◽  
John Kratz ◽  
Stephanie Simms ◽  
Marisa Strong ◽  
Perry Willett

Scholars at the ten campuses of the University of California system, like their academic peers elsewhere, increasingly are being asked to ensure that data resulting from their research and teaching activities are subject to effective long-term management, public discovery, and retrieval. The new academic imperative for research data management (RDM) stems from mandates from public and private funding agencies, pre-publication requirements, institutional policies, and evolving norms of scholarly discourse. In order to meet these new obligations, scholars need access to appropriate disciplinary and institutional tools, services, and guidance. When providing help in these areas, it is important that service providers recognize the disparity in scholarly familiarity with data curation concepts and practices. While the UC Curation Center (UC3) at the California Digital Library supports a growing roster of innovative curation services for University use, most were intended originally to meet the needs of institutional information professionals, such as librarians, archivists, and curators. In order to address the new curation concerns of individual scholars, UC3 realized that it needed to deploy new systems and services optimized for stakeholders with widely divergent experiences, expertise, and expectations. This led to the development of Dash, an online data publication service making campus data sharing easy. While Dash gives the appearance of being a full-fledged repository, in actuality it is only a lightweight overlay layer that sits on top of standards-compliant repositories, such as UC3’s existing Merritt curation repository. The Dash service offers intuitive, easy-to-use interfaces for dataset submission, description, publication, and discovery. By imposing minimal prescriptive eligibility and submission requirements; automating and hiding the mechanical details of DOI assignment, data packaging, and repository deposit; and featuring a streamlined, self-service user experience that can be integrated easily into scholarly workflows, Dash is an important new service offering with which UC scholars can meet their RDM obligations. 


Sign in / Sign up

Export Citation Format

Share Document