Achieving Efficient and Verifiable Assured Deletion for Outsourced Data Based on Access Right Revocation

Author(s):  
Yuting Cheng ◽  
Li Yang ◽  
Shui Yu ◽  
Jianfeng Ma
Keyword(s):  
Author(s):  
Alexander Brodovsky ◽  
Konstantin Sboichakov ◽  
Vladimir Sokolovsky

IRBIS64+ - the new product of IRBIS Library Automation System designed for building and maintaining digital libraries, is introduced. IRBIS64+ new functionality is revealed. New possibilities for users, including those with expanded access right, are described. The IRBIS64+ modules are named.


Author(s):  
Vairaprakash Gurusamy ◽  
◽  
S. Kannan ◽  
T. Maria Mahajan ◽  
◽  
...  

2020 ◽  
Author(s):  
Aman Singh Chauhan ◽  
Dikshika Rani ◽  
Akash Kumar ◽  
Rishabh Gupta ◽  
Ashutosh Kumar Singh

Author(s):  
Songnian Zhang ◽  
Suprio Ray ◽  
Rongxing Lu
Keyword(s):  

Information ◽  
2021 ◽  
Vol 12 (4) ◽  
pp. 142
Author(s):  
Weijing You ◽  
Lei Lei ◽  
Bo Chen ◽  
Limin Liu

By only storing a unique copy of duplicate data possessed by different data owners, deduplication can significantly reduce storage cost, and hence is used broadly in public clouds. When combining with confidentiality, deduplication will become problematic as encryption performed by different data owners may differentiate identical data which may then become not deduplicable. The Message-Locked Encryption (MLE) is thus utilized to derive the same encryption key for the identical data, by which the encrypted data are still deduplicable after being encrypted by different data owners. As keys may be leaked over time, re-encrypting outsourced data is of paramount importance to ensure continuous confidentiality, which, however, has not been well addressed in the literature. In this paper, we design SEDER, a SEcure client-side Deduplication system enabling Efficient Re-encryption for cloud storage by (1) leveraging all-or-nothing transform (AONT), (2) designing a new delegated re-encryption (DRE), and (3) proposing a new proof of ownership scheme for encrypted cloud data (PoWC). Security analysis and experimental evaluation validate security and efficiency of SEDER, respectively.


Energies ◽  
2021 ◽  
Vol 14 (5) ◽  
pp. 1463
Author(s):  
Kwami Senam A. Sedzro ◽  
Kelsey Horowitz ◽  
Akshay K. Jain ◽  
Fei Ding ◽  
Bryan Palmintier ◽  
...  

With the increasing share of distributed energy resources on the electric grid, utility companies are facing significant decisions about infrastructure upgrades. An alternative to extensive and capital-intensive upgrades is to offer non-firm interconnection opportunities to distributed generators, via a coordinated operation of utility scale resources. This paper introduces a novel flexible interconnection option based on the last-in, first-out principles of access aimed at minimizing the unnecessary non-firm generation energy curtailment by balancing access rights and contribution to thermal overloads. Although we focus on solar photovoltaic (PV) plants in this work, the introduced flexible interconnection option applies to any distributed generation technology. The curtailment risk of individual non-firm PV units is evaluated across a range of PV penetration levels in a yearlong quasi-static time-series simulation on a real-world feeder. The results show the importance of the size of the curtailment zone in the curtailment risk distribution among flexible generation units as well as that of the “access right” defined by the order in which PV units connect to the grid. Case study results reveal that, with a proper selection of curtailment radius, utilities can reduce the total curtailment of flexible PV resources by up to more than 45%. Findings show that non-firm PV generators can effectively avoid all thermal limit-related upgrade costs.


Author(s):  
Xiangyu Wang ◽  
Jianfeng Ma ◽  
Yinbin Miao ◽  
Ximeng Liu ◽  
Dan Zhu ◽  
...  

Author(s):  
Zhenzhu Chen ◽  
Anmin Fu ◽  
Robert H. Deng ◽  
Ximeng Liu ◽  
Yang Yang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document