Blockchain-based secure data sharing scheme using image steganography and encryption techniques for telemedicine applications

2022 ◽  
pp. 97-108
Author(s):  
Irina V. Pustokhina ◽  
Denis A. Pustokhin ◽  
K. Shankar
Author(s):  
Jingwen Pan ◽  
Jie Cui ◽  
Lu Wei ◽  
Yan Xu ◽  
Hong Zhong

Sensors ◽  
2018 ◽  
Vol 19 (1) ◽  
pp. 114 ◽  
Author(s):  
Dong Chen ◽  
Wei Lu ◽  
Weiwei Xing ◽  
Na Wang

With the wide application of wireless sensor networks (WSNs), secure data sharing in networks is becoming a hot research topic and attracting more and more attention. A huge challenge is securely transmitting the data from the source node to the sink node. Except for eavesdropping the information stored in the packages, the adversary may also attempt to analyze the contextual information of the network to locate the source node. In this paper, we proposed a secure data sharing approach to defend against the adversary. Specifically, we first design a secret key mechanism to guarantee the security of package delivery between a pair of nodes. Then, a light-weighted secret sharing scheme is designed to map the original message to a set of shares. Finally, the shares are delivered to the sink node independently based on a proper random routing algorithm. Simulation results illustrate that our approach can defend against the eavesdropping and tracing-back attack in an energy-efficient manner.


2018 ◽  
Vol 6 (2) ◽  
pp. 344-357 ◽  
Author(s):  
Ruixuan Li ◽  
Chenglin Shen ◽  
Heng He ◽  
Xiwu Gu ◽  
Zhiyong Xu ◽  
...  

Author(s):  
Xiuqing Lu ◽  
Zhenkuan Pan ◽  
Hequn Xian

Abstract With the development of big data and cloud computing, more and more enterprises prefer to store their data in cloud and share the data among their authorized employees efficiently and securely. So far, many different data sharing schemes in different fields have been proposed. However, sharing sensitive data in cloud still faces some challenges such as achieving data privacy and lightweight operations at resource constrained mobile terminals. Furthermore, most data sharing schemes have no integrity verification mechanism, which would result in wrong computation results for users. To solve the problems, we propose an efficient and secure data sharing scheme for mobile devices in cloud computing. Firstly, the scheme guarantees security and authorized access of shared sensitive data. Secondly, the scheme realizes efficient integrity verification before users share the data to avoid incorrect computation. Finally, the scheme achieves lightweight operations of mobile terminals on both data owner and data requester sides.


2016 ◽  
Vol 62 ◽  
pp. 193-212 ◽  
Author(s):  
Rui Jiang ◽  
Xianglong Wu ◽  
Bharat Bhargava

2019 ◽  
Vol 2019 ◽  
pp. 1-16 ◽  
Author(s):  
Binrui Zhu ◽  
Jiameng Sun ◽  
Jing Qin ◽  
Jixin Ma

The cloud-assisted Internet of Things (CIoT) is booming, which utilizes powerful data processing capabilities of the cloud platform to solve massive Internet of Things (IoT) data. However, the CIoT faces new security challenges, such as the confidentiality of the outsourced data. Data encryption is a fundamental technique that can guarantee the confidentiality of outsourced data, but it limits target encrypted data retrieval from cloud platform. Public key encryption with keyword search (PEKS) provides a promising solution to address this problem. In PEKS, a cloud server can be authorized to search the keyword in encrypted documents and retrieve associated encrypted documents for the receiver. However, most existing PEKS schemes merely focus on keyword search function while ignoring the associated documents encryption/decryption function. Thus, in practice, a PEKS scheme must cooperate with another separated public key encryption (PKE) scheme to fulfill a completely secure data sharing scheme. To address this problem, in this paper, we propose a secure data sharing scheme with designated server that combines PKE scheme with PEKS scheme, which provides both keyword search and documents encryption/decryption functions. Furthermore, only the designated server can search the keyword via encrypted documents for enhanced security in our work. Moreover, our scheme also satisfies the public verifiability of search results, which includes both keywords and documents ciphertexts’ correctness and integrity. As to the security, our scheme provides stronger indistinguishability security of document and keyword in the proposed security model.


Sign in / Sign up

Export Citation Format

Share Document