Security Analysis of “A Novel Elliptic Curve Dynamic Access Control System”

Author(s):  
Wen-Chung Kuo
2007 ◽  
Vol E90-B (8) ◽  
pp. 1979-1987 ◽  
Author(s):  
J.-H. WEN ◽  
M.-C. WU ◽  
T.-S. CHEN

2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Jingwei Wang ◽  
Xinchun Yin ◽  
Jianting Ning

Mobile crowdsensing enables people to collect and process a massive amount of information by using social resources without any cost on sensor deployment or model training. Many schemes focusing on the problems of task assignment and privacy preservation have been proposed so far. However, the privacy-preserving of requesters and task access control, which are vital to mobile crowdsensing, is barely considered in the literature. To address the aforementioned issues, a fine-grained task access control system for mobile crowdsensing is proposed. In particular, the requester can decide the group of task performers who can access the task by utilizing attribute-based encryption technology. T he untrusted crowdsensing platform cannot obtain any sensitive information concerning the requester or the task, while the qualified task performers are capable of retrieving tasks within 0.85 ms. Security analysis and experimental results are presented to show the feasibility and efficiency of the proposed system.


2020 ◽  
Vol 17 (12) ◽  
pp. 5256-5260
Author(s):  
A. Arulprakash ◽  
K. SampathKumar

Serverless computing is growing rapidly due to its rapid adoption by the cloud providers and tenants in terms of its scalability, elasticity, flexibility and ease of deployment. Such increase in deployment of serverless computing makes the research to rethink on its security aspects. Since, the serverless security computing may undergo problems due to malicious users or hackers. In this paper, a secure and an efficient access control system is designed for serverless security computing for both knowledge and resource sharing using attributed based encryption. Initially, the data is encrypted using user attributes; further the data is split into cipher text. It is finally decrypted using a decryption algorithm and then the shares of the cipher text are distributed in the network and the encapsulated texts are stored in the serverless system. The performance on security analysis shows that the proposed method achieves improved data security in serverless environment than the existing methods.


2021 ◽  
Vol 1748 ◽  
pp. 042031
Author(s):  
Zheming Yang ◽  
Di Shao ◽  
Liangyong Qu ◽  
Mei Zhang

Sign in / Sign up

Export Citation Format

Share Document