2,260 research outputs found

    Attribute-based encryption for cloud computing access control: A survey

    Get PDF
    National Research Foundation (NRF) Singapore; AXA Research Fun

    A survey on security and privacy issues in IoV

    Get PDF
    As an up-and-coming branch of the internet of things, internet of vehicles (IoV) is imagined to fill in as a fundamental information detecting and processing platform for astute transportation frameworks. Today, vehicles are progressively being associated with the internet of things which empower them to give pervasive access to data to drivers and travelers while moving. Be that as it may, as the quantity of associated vehicles continues expanding, new prerequisites, (for example, consistent, secure, vigorous, versatile data trade among vehicles, people, and side of the road frameworks) of vehicular systems are developing. Right now, the unique idea of vehicular specially appointed systems is being changed into another idea called the internet of vehicles (IoV). We talk about the issues faced in implementing a secure IoV architecture. We examine the various challenges in implementing security and privacy in IoV by reviewing past papers along with pointing out research gaps and possible future work and putting forth our on inferences relating to each paper

    Secure Key Distribution and Data sharing for Dynamic groups in Cloud to protect from Collusion Attack

    Get PDF
    Sharing group resource among cloud clients is a noteworthy issue, so cloud computing gives a economical and creative planning, Because of regular change of participation, sharing information in a multi-proprietor way to an untrusted cloud is still a testing issue. In this proposition a protected multi-proprietor information sharing plan, for element bunch in the cloud. By giving AES encryption while transferring the information, any cloud client can safely impart information to others. In the interim, the capacity overhead and encryption calculation expense of the plan are free with the quantity of disavowed clients. Furthermore, I dissect the security of this plan with thorough confirmations. One-Time Password is one of the least demanding and most well-known types of validation that can be utilized for securing access to accounts. One-Time Passwords are frequently alluded to as a protected and more grounded types of verification, and permitting them to introduce over different machines. It gives a various levels of security to share information among multi-proprietor way. To start with the client chooses the content based secret word. At that point OTP is produced consequently and sent to relating email account. We propose a protected route for key conveyance with no safe correspondence channels, and the clients can safely acquire their private keys from gathering supervisor. In the interim, we should give security assurances to the sharing information documents since they are outsourced. Sadly, in light of the regular change of the enrollment, sharing information while giving protection safeguarding is still a testing issue, particularly for an untreated cloud because of the conspiracy assault. Besides, to exist plots, the security of key conveyance depends on the safe correspondence channel, be that as it may, to have such channel is a solid presumption and is troublesome for practice

    Multi-authority attribute-based keyword search over encrypted cloud data

    Get PDF
    National Research Foundation (NRF) Singapore; AXA Research Fun

    Data Auditing and Security in Cloud Computing: Issues, Challenges and Future Directions

    Get PDF
    Cloud computing is one of the significant development that utilizes progressive computational power and upgrades data distribution and data storing facilities. With cloud information services, it is essential for information to be saved in the cloud and also distributed across numerous customers. Cloud information repository is involved with issues of information integrity, data security and information access by unapproved users. Hence, an autonomous reviewing and auditing facility is necessary to guarantee that the information is effectively accommodated and used in the cloud. In this paper, a comprehensive survey on the state-of-art techniques in data auditing and security are discussed. Challenging problems in information repository auditing and security are presented. Finally, directions for future research in data auditing and security have been discussed

    Data auditing and security in cloud computing: issues, challenges and future directions

    Get PDF
    Cloud computing is one of the significant development that utilizes progressive computational power and upgrades data distribution and data storing facilities. With cloud information services, it is essential for information to be saved in the cloud and also distributed across numerous customers. Cloud information repository is involved with issues of information integrity, data security and information access by unapproved users. Hence, an autonomous reviewing and auditing facility is necessary to guarantee that the information is effectively accommodated and used in the cloud. In this paper, a comprehensive survey on the state-of-art techniques in data auditing and security are discussed. Challenging problems in information repository auditing and security are presented. Finally, directions for future research in data auditing and security have been discusse

    RESH: A Secure Authentication Algorithm Based on Regeneration Encoding Self-Healing Technology in WSN

    Get PDF
    In the real application environment of wireless sensor networks (WSNs), the uncertain factor of data storage makes the authentication information be easily forged and destroyed by illegal attackers. As a result, it is hard for secure managers to conduct forensics on transmitted information in WSN. This work considers the regeneration encoding self-healing and secret sharing techniques and proposes an effective scheme to authenticate data in WSN. The data is encoded by regeneration codes and then distributed to other redundant nodes in the form of fragments. When the network is attacked, the scheme has the ability against tampering attack or collusion attack. Furthermore, the damaged fragments can be restored as well. Parts of fragments, encoded by regeneration code, are required for secure authentication of the original distributed data. Experimental results show that the proposed scheme reduces hardware communication overhead by five percent in comparison. Additionally, the performance of local recovery achieves ninety percent
    corecore