9 research outputs found

    Privacy-preserving security solution for cloud services

    Get PDF
    AbstractWe propose a novel privacy-preserving security solution for cloud services. Our solution is based on an efficient non-bilinear group signature scheme providing the anonymous access to cloud services and shared storage servers. The novel solution offers anonymous authenticationfor registered users. Thus, users' personal attributes (age, valid registration, successful payment) can be proven without revealing users' identity, and users can use cloud services without any threat of profiling their behavior. However, if a user breaks provider's rules, his access right is revoked. Our solution provides anonymous access, unlinkability and the confidentiality of transmitted data. We implement our solution as a proof of concept applicationand present the experimental results. Further, we analyzecurrent privacy preserving solutions for cloud services and group signature schemes as basic parts of privacy enhancing solutions in cloud services. We compare the performance of our solution with the related solutionsand schemes

    NFT Minting System on Cardano Blockchain

    No full text
    Nowadays almost everything is digitalized and online. This can cause many security issues for our data. They can be leaked, misused, or even compromised. Therefore, we need technology, which can secure digital assets. The solution to this problem can be blockchain technology and Non-Fungible Tokens (NFT). This article presents our open-source implementation of an automated NFT minting system on the Cardano blockchain. We research the capabilities of NFTs on Cardano and possibilities to create an NFT minting system similar to other successful but proprietary NFT minting systems. Our system is built on Cardano command-line interface commands in combination with Python language for easy handling of the minting process

    Light-weight Mutual Authentication with Non-repudiation

    Get PDF
    In this paper, we focused on a problem of authentication on low-cost devices. We have proposed a new light-weight protocol for mutual authentication of communication entities with non-repudiation of realized events. The protocol is simple and suitable for implementation on low-cost devices. Non-repudiation of realized events is achieved by involving a Trusted Third Party (TTP) to the communication. The proposed protocol uses only an appropriate lightweight hash function and pre-shared secret data. Security of the proposed protocol was verified by the BAN (Burrows-Abadi-Needham) logic
    corecore