Access control based privacy preserving secure data sharing with hidden access policies in cloud

2017 ◽  
Vol 75 ◽  
pp. 50-58 ◽  
Author(s):  
S. Sabitha ◽  
M.S. Rajasree
Author(s):  
Salvador Pérez ◽  
Domenico Rotondi ◽  
Diego Pedone ◽  
Leonardo Straniero ◽  
María José Núñez ◽  
...  

Author(s):  
Xin Wei ◽  
Yong Yan ◽  
Shaoyong Guo ◽  
Xuesong Qiu ◽  
Feng Qi

2021 ◽  
pp. 102553
Author(s):  
Tengfei Zheng ◽  
Yuchuan Luo ◽  
Tongqing Zhou ◽  
Zhiping Cai

Author(s):  
Chunhua Li ◽  
Ronglei Wei ◽  
Zebang Wu ◽  
Ke Zhou ◽  
Cheng Lei ◽  
...  

2019 ◽  
Vol 11 (24) ◽  
pp. 7054 ◽  
Author(s):  
Muqaddas Naz ◽  
Fahad A. Al-zahrani ◽  
Rabiya Khalid ◽  
Nadeem Javaid ◽  
Ali Mustafa Qamar ◽  
...  

In a research community, data sharing is an essential step to gain maximum knowledge from the prior work. Existing data sharing platforms depend on trusted third party (TTP). Due to the involvement of TTP, such systems lack trust, transparency, security, and immutability. To overcome these issues, this paper proposed a blockchain-based secure data sharing platform by leveraging the benefits of interplanetary file system (IPFS). A meta data is uploaded to IPFS server by owner and then divided into n secret shares. The proposed scheme achieves security and access control by executing the access roles written in smart contract by owner. Users are first authenticated through RSA signatures and then submit the requested amount as a price of digital content. After the successful delivery of data, the user is encouraged to register the reviews about data. These reviews are validated through Watson analyzer to filter out the fake reviews. The customers registering valid reviews are given incentives. In this way, maximum reviews are submitted against every file. In this scenario, decentralized storage, Ethereum blockchain, encryption, and incentive mechanism are combined. To implement the proposed scenario, smart contracts are written in solidity and deployed on local Ethereum test network. The proposed scheme achieves transparency, security, access control, authenticity of owner, and quality of data. In simulation results, an analysis is performed on gas consumption and actual cost required in terms of USD, so that a good price estimate can be done while deploying the implemented scenario in real set-up. Moreover, computational time for different encryption schemes are plotted to represent the performance of implemented scheme, which is shamir secret sharing (SSS). Results show that SSS shows the least computational time as compared to advanced encryption standard (AES) 128 and 256.


Author(s):  
Wenti Yang ◽  
Zhitao Guan ◽  
Longfei Wu ◽  
Xiaojiang Du ◽  
Mohsen Guizani

2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Zhuo Zhao ◽  
Chingfang Hsu ◽  
Lein Harn ◽  
Qing Yang ◽  
Lulu Ke

Internet of Medical Things (IoMT) is a kind of Internet of Things (IoT) that includes patients and medical sensors. Patients can share real-time medical data collected in IoMT with medical professionals. This enables medical professionals to provide patients with efficient medical services. Due to the high efficiency of cloud computing, patients prefer to share gathering medical information using cloud servers. However, sharing medical data on the cloud server will cause security issues, because these data involve the privacy of patients. Although recently many researchers have designed data sharing schemes in medical domain for security purpose, most of them cannot guarantee the anonymity of patients and provide access control for shared health data, and further, they are not lightweight enough for IoMT. Due to these security and efficiency issues, a novel lightweight privacy-preserving data sharing scheme is constructed in this paper for IoMT. This scheme can achieve the anonymity of patients and access control of shared medical data. At the same time, it satisfies all described security features. In addition, this scheme can achieve lightweight computations by using elliptic curve cryptography (ECC), XOR operations, and hash function. Furthermore, performance evaluation demonstrates that the proposed scheme takes less computation cost through comparison with similar solutions. Therefore, it is fairly an attractive solution for efficient and secure data sharing in IoMT.


2022 ◽  
Vol 40 (2) ◽  
pp. 779-793
Author(s):  
V. Rajkumar ◽  
M. Prakash ◽  
V. Vennila

Sign in / Sign up

Export Citation Format

Share Document