scholarly journals Certificateless Proxy Reencryption Scheme (CPRES) Based on Hyperelliptic Curve for Access Control in Content-Centric Network (CCN)

2020 ◽  
Vol 2020 ◽  
pp. 1-13 ◽  
Author(s):  
Zahid Ullah ◽  
Asim Zeb ◽  
Insaf Ullah ◽  
Khalid Mahmood Awan ◽  
Yousaf Saeed ◽  
...  

Information-centric networking is the developing model envisioned by an increasing body of the data communication research community, which shifts the current network paradigm from host centric to data centric, well-known to information-centric networking (ICN). Further, the ICN adopts different types of architectures to extend the growth of the Internet infrastructure, e.g., name-based routing and in-network caching. As a result, the data can be easily routed and accessed within the network. However, when the producer generates contents for authentic consumers, then it is necessary for him/her to have a technique for content confidentiality, privacy, and access control. To provide the previously mentioned services, this paper presents a certificateless proxy reencryption scheme (CPRES) based on the hyperelliptic curve for access control in the content-centric network (CCN). Using certificateless PRE, the power of the key generation center (KGC) is limited to only the generation of partial keys to secure the access to the content. With the help of these partial keys, the producer further calculates keys for encryption and reencryption process. The simulation results show that the proposed scheme provides secure access to content during end-to-end communication. Moreover, the proposed CPRES scheme outperforms in terms of low computational energy and efficient utilization of communication bandwidth.

2013 ◽  
Vol 385-386 ◽  
pp. 1705-1707
Author(s):  
Tzer Long Chen ◽  
Yu Fang Chung ◽  
Jian Mao Hong ◽  
Jeng Hong Jhong ◽  
Chin Sheng Chen ◽  
...  

It is important to notice that the access control mechanism has been widely applied in various areas, such as on-line video systems, wireless network, and electronic documents. We propose an access control mechanism which is constructed based on two mathematical fundamentals: Lagrange interpolation and ElGamal algorithm. We conduct performance analysis to compare the efficiency of our proposed scheme with that of several related published schemes in both key generation phase and key derivation phase. Our new scheme is proven to be more efficient. It is shown, as expected, a more efficient scheme provides relatively less security and a more secure scheme is relatively less efficient for private keys of the same size.


2014 ◽  
Vol 513-517 ◽  
pp. 772-776
Author(s):  
Chen Wang ◽  
Hong Ai ◽  
Lie Wu ◽  
Yun Yang

The smart grid that the next-generation electric power system is studied intensively as a promising solution for energy crisis. One important feature of the smart grid is the integration of high-speed, reliable and secure data communication networks to manage the complex power systems effectively and intelligently. The goal of smart grid is to achieve the security of operation, economic efficient and environmental friendly. To achieve this goal, we proposed a fine-grained access control model for smart grid. In order to improve the security of smart grid, an access-trust-degree algorithm is proposed to evaluate the reliability of the user who want to access to the smart grid.


2021 ◽  
Vol 13 (10) ◽  
pp. 262
Author(s):  
Jia Shi ◽  
Xuewen Zeng ◽  
Yang Li

Standalone Name Resolution (SNR) is an essential component of many Information-Centric Networking (ICN) infrastructures that maps and stores the mappings of IDs and locators. The delivery of data can be realized only when the name resolution process is completed correctly. It also makes the SNR become the key target of network attackers. In this paper, our research focuses on the more covert and complex Content Pollution Attack (CPA). By continuously sending invalid content to the network at a low speed, attackers will consume a lot of the resources and time of the SNR system, resulting in a serious increase in the resolution delay of normal users and further cache pollution in ICN. It is difficult to be quickly detected because the characteristics of attack are inconspicuous. To address the challenge, a register access control scheme for an SNR system based on a malicious user blacklist query is proposed. A neighbor voting algorithm is designed to discover possible attacks in the network quickly and build a blacklist of malicious users reasonably. Users on the blacklist will be restricted from accessing the ICN network during the registration phase with the resolution system. Incentives and punishments for network users are introduced to automate responses about the potential malicious behavior reports. Our scheme is more efficient as users do not have to wait for an additional system component to perform operations. In addition, our algorithm can better solve the collusion problem in the voting process when compared with the others. We experimentally evaluate our protocol to demonstrate that the probability of successful collusion attack can be reduced to less than 0.1 when the attacker ratio is 0.5.


2012 ◽  
Vol 263-266 ◽  
pp. 1447-1452
Author(s):  
Hong Wei Zhang ◽  
Wen Juan Zhang ◽  
Xue Feng Han

With data quantity increasing dramatically and signal transmission period becoming more and more fast, the media access control delay has proved to be one of the main influence factors of CAN network real-time. Firstly, an equivalent numerical simulation model of CAN bus network is built to derivate the mathematical expression of media access control delay. Secondly, optimization measures are further proposed to improve the data communication real-time. At last, the optimization measures tested by experiments are proved to be correct and effective.


2018 ◽  
Vol 20 (1) ◽  
pp. 566-600 ◽  
Author(s):  
Reza Tourani ◽  
Satyajayant Misra ◽  
Travis Mick ◽  
Gaurav Panwar

2021 ◽  
Author(s):  
Sonya A ◽  
Kavitha G

Abstract There has been noteworthy issues that must be tackled by the healthcare sector along with handling the security concerns that are intensely linked with offering of healthcare services, inculcating novel electronic healthcare systems, and secure data communication with different healthcare and government institutions. These security related concerns project several privacy preserving methodologies pertaining to the privacy and security of EHRs (electronic health records) in the cloud. The EHRs comprises of information related to demographics, medical histories, digital images, medications, lab reports, billing details and other sensitive patient information. All this sensitive patient information is kept highly secured and resides in third party servers with definite access controlling mechanism. The conventional system employs various cryptography algorithm for authorization, encryption, decryption, key generation and validation algorithms. There is proposal of a new cryptography algorithm for combating the limitations of AES, RSA and ABS. For securing the healthcare data residing in the cloud, the research presents effective utilization of new hybrid cryptography algorithm and Blockchain technology with smart contract. Unlike the prevailing three cryptographic algorithms, the proposed algorithm offers enhanced time, accuracy, efficiency and key generation and performance. Overall, there is a drastic transformation in securing the healthcare records using the proposed approach.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Xiaodan Chen ◽  
Desheng Zeng ◽  
Shuanglong Pang ◽  
Fu Jun

In order to improve data security, ensure user privacy, and solve the problems of low data access control accuracy, long time consumption, and high energy consumption in traditional methods, a cloud computing storage data access control method based on dynamic re-encryption is proposed. The principal component analysis method is used to reduce the dimension of the cloud computing storage data, and the random forest algorithm is further used to classify and process the cloud computing storage data according to the processing results. On the basis of data preprocessing, an access control tree is established to obtain the correlation of data nodes. Finally, the dynamic re-encryption method is used for data security state transformation, and the data access control of cloud computing storage is realized through key generation, encryption, re-encryption key generation, and decryption. The experimental results show that the data access control accuracy of the method in this paper is high, time consumption is small, and energy consumption is small, and it is more suitable for cloud computing systems with huge data and information.


Author(s):  
Muneer Bani Yassein ◽  
Wail Mardini ◽  
Amnah Al-Abdi

Internet of Things (IoT) is one of the most active and hot topics these days in which most of our everyday objects are connected with each other over internal and external networks. As in any data communication paradigm there are security aspects that should be taken care of. The traditional security mechanisms are usually not applicable in IoT because there are different standards involved, this make the security preservation is one of the main challenges in IoT. According to previous surveys, there are many of security issues in regards to IoT. In this chapter, five issues from the security issues in IoT are discussed; Access Control, Authentication, Privacy, Policy Enforcement, and Trust. After that, major proposed solutions from the literature is listed and compared according to the strength and weakness points for each of them.


Author(s):  
George Pallis ◽  
Konstantina Stoupa ◽  
Athena Vakali

XML documents management is becoming an area of great research value and interest since XML has become a popular standard for data communication and knowledge exchange over the Internet. Therefore, new issues have emerged in terms of storage and access control policies for XML documents. Concerning the storage issues, the majority of proposals rely on the usage of typical database management systems (DBMSs), whereas XML documents can also be stored in other storage environments (such as file systems and LDAP directories). It is important to consider storage and access control together since these issues are essential in implementations for XML documents management. Moreover, the chapter focuses on the recent access control models which guarantee the security of the XML-based data, which are located in a variety of storage topologies. This chapter’s goal is to survey and classify existing approaches for XML documents storage and access control, and, at the same time, highlight the main differences between them. The most popular XML database software tools are outlined in terms of their storage and access control policies.


Sign in / Sign up

Export Citation Format

Share Document