scholarly journals Fine-Grained Task Access Control System for Mobile Crowdsensing

2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Jingwei Wang ◽  
Xinchun Yin ◽  
Jianting Ning

Mobile crowdsensing enables people to collect and process a massive amount of information by using social resources without any cost on sensor deployment or model training. Many schemes focusing on the problems of task assignment and privacy preservation have been proposed so far. However, the privacy-preserving of requesters and task access control, which are vital to mobile crowdsensing, is barely considered in the literature. To address the aforementioned issues, a fine-grained task access control system for mobile crowdsensing is proposed. In particular, the requester can decide the group of task performers who can access the task by utilizing attribute-based encryption technology. T he untrusted crowdsensing platform cannot obtain any sensitive information concerning the requester or the task, while the qualified task performers are capable of retrieving tasks within 0.85 ms. Security analysis and experimental results are presented to show the feasibility and efficiency of the proposed system.

2015 ◽  
Vol 4 (3) ◽  
pp. 276-287 ◽  
Author(s):  
Boniface K. Alese ◽  
Sylvester O. Olatunji ◽  
Oluwatoyin C. Agbonifo ◽  
Aderonke F. Thompson

2018 ◽  
Vol 40 ◽  
pp. 31-43 ◽  
Author(s):  
Panagiotis Andriotis ◽  
Gianluca Stringhini ◽  
Martina Angela Sasse

2020 ◽  
Vol 17 (12) ◽  
pp. 5256-5260
Author(s):  
A. Arulprakash ◽  
K. SampathKumar

Serverless computing is growing rapidly due to its rapid adoption by the cloud providers and tenants in terms of its scalability, elasticity, flexibility and ease of deployment. Such increase in deployment of serverless computing makes the research to rethink on its security aspects. Since, the serverless security computing may undergo problems due to malicious users or hackers. In this paper, a secure and an efficient access control system is designed for serverless security computing for both knowledge and resource sharing using attributed based encryption. Initially, the data is encrypted using user attributes; further the data is split into cipher text. It is finally decrypted using a decryption algorithm and then the shares of the cipher text are distributed in the network and the encapsulated texts are stored in the serverless system. The performance on security analysis shows that the proposed method achieves improved data security in serverless environment than the existing methods.


2005 ◽  
Vol 9 (2) ◽  
pp. 143-171 ◽  
Author(s):  
Elisa Bertino ◽  
Anna C. Squicciarini ◽  
Ivan Paloscia ◽  
Lorenzo Martino

Informatica ◽  
2008 ◽  
Vol 19 (4) ◽  
pp. 517-534 ◽  
Author(s):  
Mustafa M. Kocatürk ◽  
Taflan İ. Gündem

2015 ◽  
Vol 11 (1) ◽  
pp. 857405 ◽  
Author(s):  
Shi-Feng Sun ◽  
Chen Lyu ◽  
Dawu Gu ◽  
Yuanyuan Zhang ◽  
Yanli Ren

Sign in / Sign up

Export Citation Format

Share Document