72 research outputs found

    REFINED DUAL ASPECT ENTRÉE MANAGEMENT FOR CLOUD SERVICES

    Get PDF
    In this particular paper, we introduce a totally new fine-grained two-factor authentication (two-FA) access control system for web-based cloud-computing services. Particularly, inside our recommended two-FA access control system, a characteristic-based access control mechanism is implemented with involve both an individual secret key plus a lightweight security device. As being a user cannot connect somewhere after they don't hold both, the mechanism can enhance the reassurance within the machine, specifically in individual’s scenarios where plenty of users share the identical computer for web-based cloud services. There's two troubles for your standard account/password based system. First, the traditional account/password-based authentication is not privacy-preserving. Inside the signing or understanding formula, it requires the important thing factor coupled with SEM together. In addition, attribute-based control inside the system also enables the cloud server to limit using individual’s users utilizing the same quantity of attributes while preserving user privacy, i.e., the cloud server only recognizes that the customer fulfills the most effective predicate, but does not have idea inside the exact identity inside the user. Inside the signature verification or file encryption formula, it requires the customer public key coupled with corresponding identity. Finally, we perform simulation to demonstrate the practicability within our recommended two-FA system

    A RIGID DUAL PHASE CONTROL APPROACH FOR ONLINE CLOUD COMPUTING SERVICES

    Get PDF
    We offer a completely new access control system (2-FA) and two-factor authentication for cloud-based cloud services. Specifically, under the access control system we use from two FA modules, access control features are implemented with a person's secret key and a lightweight security device. Because the user cannot connect somewhere when they do not have a connection, the machine can improve peace of mind on the device, especially in individual scenarios where many users share the exact same computer for cloud-based services. There are two issues with your account / password system. First, traditional account / password-based authentication is not based on maintaining privacy. Under the signature or understanding formula, take the main factor along with the SEM together. In addition, object-based control within the system also allows the cloud server to restrict the use of individual users with the same number of features while maintaining user privacy, meaning that the cloud server understands only that the client complies with the correct document, but does not work. The minute inside the user. Under Validate Signature or Encryption Format, the client's public key takes the corresponding identity. Finally, we implemented a simulation to demonstrate practical capability within our proposed dual system

    SUPER OBTAINED TWO FACTORS GET THE CHANCE TO CONTROL FOR WEB APPLICATIONS

    Get PDF
    Personally, introduce a totally new fine-grained two-factor authentication (two-fa) access control procedure for web-based cloud-computing services. particularly, within our offered two-fa access control rule, a characteristic-based access control mechanism is implemented with involve both a person secret key along with a lightweight security device. as being a user cannot connect somewhere once they don't hold both, electrifying mechanism can enhance tense peace of mind in sensational machine, particularly in individual’s scenarios where lots of users share exactly suspenseful same computer for web-based cloud services. there are 2 troubles for your standard account/password-based arrangement. first, electrifying traditional account/password-based authentication isn't privacy-preserving. within powerful signing or understanding formula, it takes histrionic key factor along with suspenseful seem together. in addition, attribute-based control within powerful organization also enables electrifying cloud server ending with limit using individual’s users sticking with melodramatic same quantity of attributes while preserving user privacy, i.e., melodramatic cloud server only understands that striking client fulfills histrionic right predicate but doesn't have idea across tense exact identity within impressive user. within sudden signature verification or file encryption formula, it takes startling client public key along with electrifying corresponding identity. finally, privately implement a reproduction so describe tense feasibility within our propounded two-fa structure

    ACHIEVING CAPABLE AND EFFICIENT DATA ACCESS FOR CLOUD SUPPORTED THINGS IN GRID

    Get PDF
    The recently proposed model access control, the access control feature-known as a good candidate to address the first issue. And not only does not give anonymous access to the authentication gives it its species, according to what it has done, but also the spirit over on the applicant's actuations, the swift air, or sometimes in the thing in the knowledge of the matter. The access control system is based on the features. There are many applications clouds computing, for example, data analysis, data storage, data management large, medical information systems, etc. Standard account / password, the authentication is to maintain privacy. However, it is recognized that privacy is considered as a vital feature of cloud computing systems. The general concept is a key, long-term storage locked security over the keys, rather than the computer-limited physical device. Short-term keys to effective password, but they are considered less secure encryption based on the users of the machine where possible reasons. In this document, we recommend a two-factor-based access control protocol cloud to cloud services, a lightweight security device. The features of our protocol, the best of which is the function to create a variety of policies to provide access to the accessibility according to the individual characteristics of the different according to different scenarios. At the same time can be user privacy

    TRUTHFUL ACCESS CONTROL OF GRANULAR AGENTS FOR CLOUD-BASED SERVICES

    Get PDF
    A as of late offered get right of entry to keep an eye on original referred to as attribute-based get admission to keep an eye on is an efficient bidder to take on the 1st teaser. It-not most effective provides you know who corroboration but also in addition defines get admission to keep watch over policies per face inside the requester, air, or perchance the data tangle. In an attribute-based get entry to keep watch over arrangement. There are a variety of applying cloud-computing, let's say testimony discussing, knowledge arsenal, big memorandums care, healing break procedure etc. The usual account/password-based proof is not separateness preserving. However, it's properly sanctioned such solitude is a crucial item subsequent regarded as in cloud-computing practices. The umbrella notion of key-insulated cover finished up allow hide lengthy-term keys within a physically-secure but computationally-limited machine. Short-term hush-hush keys are depot by enjoyers at the potent but rocky project locus cryptographic computations transpire. Within previously mentioned news, we suggest a superb-grained two-factor get right of entry to keep an eye on agreement for web-based cloud-computing services and products, utilizing a trivial redemption apparatus. Our compact supports slender attribute-based get right of entry to which provides an exceptional ambidexterity for this process to organize the several get entry to policies in response to the various scenarios. Simultaneously, the separation with the buyer can be preserved

    Finding Safety in Numbers with Secure Allegation Escrows

    Full text link
    For fear of retribution, the victim of a crime may be willing to report it only if other victims of the same perpetrator also step forward. Common examples include 1) identifying oneself as the victim of sexual harassment, especially by a person in a position of authority or 2) accusing an influential politician, an authoritarian government, or ones own employer of corruption. To handle such situations, legal literature has proposed the concept of an allegation escrow: a neutral third-party that collects allegations anonymously, matches them against each other, and de-anonymizes allegers only after de-anonymity thresholds (in terms of number of co-allegers), pre-specified by the allegers, are reached. An allegation escrow can be realized as a single trusted third party; however, this party must be trusted to keep the identity of the alleger and content of the allegation private. To address this problem, this paper introduces Secure Allegation Escrows (SAE, pronounced "say"). A SAE is a group of parties with independent interests and motives, acting jointly as an escrow for collecting allegations from individuals, matching the allegations, and de-anonymizing the allegations when designated thresholds are reached. By design, SAEs provide a very strong property: No less than a majority of parties constituting a SAE can de-anonymize or disclose the content of an allegation without a sufficient number of matching allegations (even in collusion with any number of other allegers). Once a sufficient number of matching allegations exist, the join escrow discloses the allegation with the allegers' identities. We describe how SAEs can be constructed using a novel authentication protocol and a novel allegation matching and bucketing algorithm, provide formal proofs of the security of our constructions, and evaluate a prototype implementation, demonstrating feasibility in practice.Comment: To appear in NDSS 2020. New version includes improvements to writing and proof. The protocol is unchange
    • …
    corecore