SPPGKM: A secure polynomial function powered group key management scheme for dynamic user environments in cloud DOI
S. Manikandan, S. Milton Ganesh

Concurrency and Computation Practice and Experience, Journal Year: 2022, Volume and Issue: 34(21)

Published: May 7, 2022

Abstract In this modern era of smart cities supported by digital locker facilities, e‐governance, e‐healthcare, e‐banking, e‐learning systems, and other People use mobile phones to upload share sensitive documents with others. Previous group key management schemes suffer from problems such as expensive double encryptions, the need for re‐encryption during every user leave operation becoming vulnerable attacks. Hence, address these three issues, manuscript introduces a pairing based cryptography computationally efficient protocol powered polynomial equations. First, reduce computational overhead communication, document is encrypted only once minimal complexity before uploaded cloud. Second, or join operation, in cloud avoided manager side tactically relieving parameters parameters. Finally, security analysis shows that careful handling secure users averts collusion attack, man‐in‐the‐middle message modification attacks, all possible The implementation results portray capacity work handle communications storage.

Language: Английский

Privacy preserving data sharing method for social media platforms DOI Creative Commons

Snehlata Yadav,

Namita Tiwari

PLoS ONE, Journal Year: 2023, Volume and Issue: 18(1), P. e0280182 - e0280182

Published: Jan. 20, 2023

Digital security as a service is crucial aspect it deals with user privacy provision and secure content delivery to legitimate users. Most social media platforms utilize end-to-end encryption significant feature. However, multimedia data transmission in group communication not encrypted. One of the most important objectives for provider send desired data/service only subscriber. Broadcast appropriate cryptographic primitive solution this problem. Therefore, study devised construction called anonymous revocable identity-based broadcast that preserves messages broadcasted identity users, where even revoked users cannot extract information about user's sent data. The update key periodically non-revoked who can obtain message using decryption keys. A third-party also revoke It proven proposed semantically against IND-ID-CPA attacks efficient terms computational cost bandwidth.

Language: Английский

Citations

11

Random Self-Generative Schnorr Certificate less Signcryption for Secure Data Sharing in Mobile Cloud Environments DOI Open Access

Varagani Durga Shyam Prasad,

Mohammed Rafi,

Mohammad Ahmed

et al.

WSEAS TRANSACTIONS ON COMPUTER RESEARCH, Journal Year: 2025, Volume and Issue: 13, P. 270 - 280

Published: April 10, 2025

To deliver applications and services required by mobile devices, cloud computing adopts computing. Cloud assists data sharing among authorized users through stored on servers. Data implies distributing resources to multiple or with the utmost security. But maintaining security while transferring in is an important challenge. In conventional algorithms, a secure environment control policies accessing for are biggest concerns deal with. handle these sensitive issues eliminate drawbacks novel technique termed Random Self-Generative Schnorr Certificateless Signcryption-based Secured Sharing (RSGSCS-SDS) proposed this work. The work improves environments. approach, initially information of registered can be server getting access permission various services. Using RSGSCS algorithm, each user, generates private public keys. Depending attributes policy, authorization user verified after receiving request. After requested transmitted form cipher text digital signature. This signature at his end, decrypted. ensures that only original content, step sharing. efficacy RSGSCS-SDS procedure evaluated key metrics like storage overhead, computational time, confidentiality rate. Experimental results demonstrate effectiveness method enhancing

Language: Английский

Citations

0

An Optimization Model for Task Scheduling in Mobile Cloud Computing DOI
Rashid Alakbarov

International Journal of Cloud Applications and Computing, Journal Year: 2022, Volume and Issue: 12(1), P. 1 - 17

Published: March 4, 2022

The rapid increase in the number of mobile users cloud computing (MCC), servers' remoteness, and Internet loading have caused significant delays delivery processed data to user. selection most suitable cloudlet that allows running users' applications rapidly is still an urgent problem. In paper we propose a strategy for selecting with high productivity, which provides fast solution, considering complexity degree application (file type). Here also noted balanced distribution software network ensures reduction delays. paper, proposed strategy, mathematical model optimal has been cloudlets energy consumption on devices, uploading issue cloud, obtaining results, reducing

Language: Английский

Citations

16

A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing DOI Open Access
Negalign Wake Hundera, Qian Mei, Hu Xiong

et al.

KSII Transactions on Internet and Information Systems, Journal Year: 2020, Volume and Issue: 14(1)

Published: Jan. 31, 2020

As a user in modern societies with the rapid growth of Internet environment and more complicated business flow processes order to be effective at work accomplish things on time when manager company went for trip, he/she need delegate his/her signing authorities someone such that, delegatee can act as sign message behalf.In make delegation process secure authentic, we proposed efficient identity-based proxy signcryption cloud data sharing (SE-IDPSC-CS), which provides privilege mechanism person agent.Our scheme allows agent generate signcrypted messages behalf using special information called "proxy key".Then, uploads ciphertext service provider (CSP) only downloaded, decrypted verified by an authorized any from place through Internet.Finally, security analysis experiment result determine that outperforms previous works terms functionalities computational time.

Language: Английский

Citations

14

Security and trust in cloud application life-cycle management DOI
Massimiliano Albanese, Alessandra De Benedictis, Douglas Dyllon Jerônimo de Macedo

et al.

Future Generation Computer Systems, Journal Year: 2020, Volume and Issue: 111, P. 934 - 936

Published: June 15, 2020

Language: Английский

Citations

7

Deep multilayer percepted policy attribute Lamport certificateless signcryption for secure data access and sharing in cloud DOI

J Mala,

A. N. Jayanthi

Distributed and Parallel Databases, Journal Year: 2021, Volume and Issue: 40(1), P. 67 - 84

Published: April 23, 2021

Language: Английский

Citations

2

SPPGKM: A secure polynomial function powered group key management scheme for dynamic user environments in cloud DOI
S. Manikandan, S. Milton Ganesh

Concurrency and Computation Practice and Experience, Journal Year: 2022, Volume and Issue: 34(21)

Published: May 7, 2022

Abstract In this modern era of smart cities supported by digital locker facilities, e‐governance, e‐healthcare, e‐banking, e‐learning systems, and other People use mobile phones to upload share sensitive documents with others. Previous group key management schemes suffer from problems such as expensive double encryptions, the need for re‐encryption during every user leave operation becoming vulnerable attacks. Hence, address these three issues, manuscript introduces a pairing based cryptography computationally efficient protocol powered polynomial equations. First, reduce computational overhead communication, document is encrypted only once minimal complexity before uploaded cloud. Second, or join operation, in cloud avoided manager side tactically relieving parameters parameters. Finally, security analysis shows that careful handling secure users averts collusion attack, man‐in‐the‐middle message modification attacks, all possible The implementation results portray capacity work handle communications storage.

Language: Английский

Citations

0