Privacy preserving data sharing method for social media platforms
Snehlata Yadav,
No information about this author
Namita Tiwari
No information about this author
PLoS ONE,
Journal Year:
2023,
Volume and Issue:
18(1), P. e0280182 - e0280182
Published: Jan. 20, 2023
Digital
security
as
a
service
is
crucial
aspect
it
deals
with
user
privacy
provision
and
secure
content
delivery
to
legitimate
users.
Most
social
media
platforms
utilize
end-to-end
encryption
significant
feature.
However,
multimedia
data
transmission
in
group
communication
not
encrypted.
One
of
the
most
important
objectives
for
provider
send
desired
data/service
only
subscriber.
Broadcast
appropriate
cryptographic
primitive
solution
this
problem.
Therefore,
study
devised
construction
called
anonymous
revocable
identity-based
broadcast
that
preserves
messages
broadcasted
identity
users,
where
even
revoked
users
cannot
extract
information
about
user's
sent
data.
The
update
key
periodically
non-revoked
who
can
obtain
message
using
decryption
keys.
A
third-party
also
revoke
It
proven
proposed
semantically
against
IND-ID-CPA
attacks
efficient
terms
computational
cost
bandwidth.
Language: Английский
Random Self-Generative Schnorr Certificate less Signcryption for Secure Data Sharing in Mobile Cloud Environments
Varagani Durga Shyam Prasad,
No information about this author
Mohammed Rafi,
No information about this author
Mohammad Ahmed
No information about this author
et al.
WSEAS TRANSACTIONS ON COMPUTER RESEARCH,
Journal Year:
2025,
Volume and Issue:
13, P. 270 - 280
Published: April 10, 2025
To
deliver
applications
and
services
required
by
mobile
devices,
cloud
computing
adopts
computing.
Cloud
assists
data
sharing
among
authorized
users
through
stored
on
servers.
Data
implies
distributing
resources
to
multiple
or
with
the
utmost
security.
But
maintaining
security
while
transferring
in
is
an
important
challenge.
In
conventional
algorithms,
a
secure
environment
control
policies
accessing
for
are
biggest
concerns
deal
with.
handle
these
sensitive
issues
eliminate
drawbacks
novel
technique
termed
Random
Self-Generative
Schnorr
Certificateless
Signcryption-based
Secured
Sharing
(RSGSCS-SDS)
proposed
this
work.
The
work
improves
environments.
approach,
initially
information
of
registered
can
be
server
getting
access
permission
various
services.
Using
RSGSCS
algorithm,
each
user,
generates
private
public
keys.
Depending
attributes
policy,
authorization
user
verified
after
receiving
request.
After
requested
transmitted
form
cipher
text
digital
signature.
This
signature
at
his
end,
decrypted.
ensures
that
only
original
content,
step
sharing.
efficacy
RSGSCS-SDS
procedure
evaluated
key
metrics
like
storage
overhead,
computational
time,
confidentiality
rate.
Experimental
results
demonstrate
effectiveness
method
enhancing
Language: Английский
An Optimization Model for Task Scheduling in Mobile Cloud Computing
International Journal of Cloud Applications and Computing,
Journal Year:
2022,
Volume and Issue:
12(1), P. 1 - 17
Published: March 4, 2022
The
rapid
increase
in
the
number
of
mobile
users
cloud
computing
(MCC),
servers'
remoteness,
and
Internet
loading
have
caused
significant
delays
delivery
processed
data
to
user.
selection
most
suitable
cloudlet
that
allows
running
users'
applications
rapidly
is
still
an
urgent
problem.
In
paper
we
propose
a
strategy
for
selecting
with
high
productivity,
which
provides
fast
solution,
considering
complexity
degree
application
(file
type).
Here
also
noted
balanced
distribution
software
network
ensures
reduction
delays.
paper,
proposed
strategy,
mathematical
model
optimal
has
been
cloudlets
energy
consumption
on
devices,
uploading
issue
cloud,
obtaining
results,
reducing
Language: Английский
A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing
KSII Transactions on Internet and Information Systems,
Journal Year:
2020,
Volume and Issue:
14(1)
Published: Jan. 31, 2020
As
a
user
in
modern
societies
with
the
rapid
growth
of
Internet
environment
and
more
complicated
business
flow
processes
order
to
be
effective
at
work
accomplish
things
on
time
when
manager
company
went
for
trip,
he/she
need
delegate
his/her
signing
authorities
someone
such
that,
delegatee
can
act
as
sign
message
behalf.In
make
delegation
process
secure
authentic,
we
proposed
efficient
identity-based
proxy
signcryption
cloud
data
sharing
(SE-IDPSC-CS),
which
provides
privilege
mechanism
person
agent.Our
scheme
allows
agent
generate
signcrypted
messages
behalf
using
special
information
called
"proxy
key".Then,
uploads
ciphertext
service
provider
(CSP)
only
downloaded,
decrypted
verified
by
an
authorized
any
from
place
through
Internet.Finally,
security
analysis
experiment
result
determine
that
outperforms
previous
works
terms
functionalities
computational
time.
Language: Английский
Security and trust in cloud application life-cycle management
Future Generation Computer Systems,
Journal Year:
2020,
Volume and Issue:
111, P. 934 - 936
Published: June 15, 2020
Language: Английский
Deep multilayer percepted policy attribute Lamport certificateless signcryption for secure data access and sharing in cloud
J Mala,
No information about this author
A. N. Jayanthi
No information about this author
Distributed and Parallel Databases,
Journal Year:
2021,
Volume and Issue:
40(1), P. 67 - 84
Published: April 23, 2021
Language: Английский
SPPGKM: A secure polynomial function powered group key management scheme for dynamic user environments in cloud
Concurrency and Computation Practice and Experience,
Journal Year:
2022,
Volume and Issue:
34(21)
Published: May 7, 2022
Abstract
In
this
modern
era
of
smart
cities
supported
by
digital
locker
facilities,
e‐governance,
e‐healthcare,
e‐banking,
e‐learning
systems,
and
other
People
use
mobile
phones
to
upload
share
sensitive
documents
with
others.
Previous
group
key
management
schemes
suffer
from
problems
such
as
expensive
double
encryptions,
the
need
for
re‐encryption
during
every
user
leave
operation
becoming
vulnerable
attacks.
Hence,
address
these
three
issues,
manuscript
introduces
a
pairing
based
cryptography
computationally
efficient
protocol
powered
polynomial
equations.
First,
reduce
computational
overhead
communication,
document
is
encrypted
only
once
minimal
complexity
before
uploaded
cloud.
Second,
or
join
operation,
in
cloud
avoided
manager
side
tactically
relieving
parameters
parameters.
Finally,
security
analysis
shows
that
careful
handling
secure
users
averts
collusion
attack,
man‐in‐the‐middle
message
modification
attacks,
all
possible
The
implementation
results
portray
capacity
work
handle
communications
storage.
Language: Английский