Secure server-aided attribute-based signature with perfect anonymity for cloud-assisted systems

2022 ◽  
Vol 65 ◽  
pp. 103066
Author(s):  
Zhenjie Huang ◽  
Zhiwei Lin
Keyword(s):  
2018 ◽  
Author(s):  
Dick Bierman ◽  
Jacob Jolij

We have tested the feasibility of a method to prevent the occurrence of so-called Questionable Research Practices (QRP). A part from embedded pre-registration the major aspect of the system is real-time uploading of data on a secure server. We outline the method, discuss the drop-out treatment and compare it to the Born-open data method, and report on our preliminary experiences. We also discuss the extension of the data-integrity system from secure server to use of blockchain technology.


2011 ◽  
Vol 61 (7) ◽  
pp. 1705-1723 ◽  
Author(s):  
Wei Wu ◽  
Yi Mu ◽  
Willy Susilo ◽  
Xinyi Huang

2017 ◽  
Vol 2017 (1) ◽  
pp. 000699-000704
Author(s):  
Len Chorosinski ◽  
Venky Sundaram ◽  
Klaus Wolter ◽  
Richard Calatayud ◽  
Parrish Ralston ◽  
...  

Abstract Under the DARPA/MTO SHIELD program, a Northrop Grumman led team is developing a supply chain traceability and authentication method to protect against the growing threat of counterfeit electronic parts. The foundation of our SHIELD solution is an advanced 100μm × 100μm × 20μm near-field RFID “dielet” fabricated on 14nm CMOS. This dielet will be embedded in a host component's packaging and provides a hardware root-of-trust through the integration of advanced key protection and cryptographic techniques. Throughout the life-cycle of the host component, the authenticity can be verified using an RF probe to energize and communicate with the dielet, performing a cryptographic challenge and providing a response to a centralized secure server and SHIELD authenticity database. This paper provides a general overview of the dielet design, packaging, and host component insertion. This research was developed with funding from the DARPA. The views, opinions and/or findings expressed are those of the author and should not be interpreted as representing the official views or policies of the Department of Defense or the U.S. Government.


2017 ◽  
Vol 420 ◽  
pp. 345-363 ◽  
Author(s):  
Yujue Wang ◽  
HweeHwa Pang ◽  
Yanjiang Yang ◽  
Xuhua Ding
Keyword(s):  

Author(s):  
Kevin Foltz ◽  
William R. Simpson

The Enterprise Level Security (ELS) model focuses on designing secure, distributed web-based systems starting from basic principles. One area of ELS that poses significant design challenges is protection of web server private keys in a public cloud. Web server private keys are of critical importance because they control who can act as the server to represent the enterprise. This includes responding to requests as well as making requests within the enterprise and to its partners. The cloud provider is not part of this trusted network of servers, so the cloud provider should not have access to server private keys. However, current cloud systems are designed to allow cloud providers free access to server private keys. This paper proposes design solutions to securely manage private keys in a public cloud. An examination of commonly used approaches demonstrates the ease with which cloud providers can currently control server private keys. Two designs are proposed to prevent cloud provider access to keys, and their implementation issues are discussed.


2018 ◽  
Vol 14 (1) ◽  
pp. 30
Author(s):  
Olivia Hautier-Suply ◽  
Yasmin Friedmann ◽  
Julian Shapley

Technological advances have led to innovative insulin delivery systems for patients with type 1 diabetes mellitus. In particular, the combination of miniature engineering and software algorithms contained in continuous subcutaneous insulin infusion (CSII) system pumps provide the user and the healthcare practitioner with an opportunity to review and adjust blood glucose (BG) levels according to system feedback, and to modify or programme their regimen according to their needs. While CSII pumps record a number of data parameters such as BG level, carbohydrate intake, activity and insulin delivered, these data are generally ‘locked in’ and can only be accessed by uploading to a cloud-based system, thus information is not contemporaneous. The Cellnovo Diabetes Management System (Cellnovo, Bridgend, UK) allows data to be transmitted securely and wirelessly in real time to a secure server, which is then retrieved by an online platform, the Cellnovo Online platform, enabling continuous access by the user and by clinicians. In this article, the authors describe a retrospective review of the patient data automatically uploaded to the Cellnovo Online platform. Baseline clinical and demographic characteristics collected at the start of pump therapy are shown for all patients, and BG data from a sub-cohort of patients who have been using the system for at least 6 months and who take and record an average of three BG level tests per day are presented to demonstrate glycaemic data over time.


Sign in / Sign up

Export Citation Format

Share Document