scholarly journals User Centric Block-Level Attribute Based Encryption in Cloud Using Blockchains

2022 ◽  
Vol 42 (2) ◽  
pp. 605-618
Author(s):  
S. Godfrey Winster ◽  
A. Siva Kumar ◽  
R. Ramesh
2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Siwan Noh ◽  
Donghyun Kim ◽  
Zhipeng Cai ◽  
Kyung-Hyune Rhee

Recently, the concept of a decentralized data marketplace is getting much attention to exchange user data. Multi-authority attribute-based encryption (ABE), which can provide flexibility and user-centric access control, is previously widely used in decentralized data sharing applications and also becoming a foundation to build decentralized data trading applications. It is known that users in a multi-authority ABE system can collude by sharing their secret information for malicious purposes. To address this issue, the collusion-resistant multi-authority ABE model was introduced in which a unique global identifier (GID) is issued by the central authority (CA) to each user. Unfortunately, such approach cannot be used directly to build a decentralized data marketplace as (a) such intervention of the CA is directly against the main motivation of the decentralized trading platform and, mostly importantly, (b) the CA can exploit its full knowledge on users’ GID to launch various attacks against users. Motivated by these observations, this paper introduces a novel user collusion-resistant decentralized multi-authority ABE scheme for privacy preserving data trading systems. In the existing multi-authority ABE systems, users utilize his/her GID that is solely assigned by the CA to generate his/her secret keys throughout the collaboration with authorities and a user can compute multi-authority keys by combining the secret keys (stem from the same GID) in various ways. In the proposed system, the CA only has a partial knowledge of users’ GIDs, and thus, users’ privacy can be protected. On the other hand, we set the user’s own partial GID as a secret which can be used to withdraw his/her deposit to discourage any possible collusion among users.


2013 ◽  
Vol 221 (3) ◽  
pp. 190-200 ◽  
Author(s):  
Jörg-Tobias Kuhn ◽  
Thomas Kiefer

Several techniques have been developed in recent years to generate optimal large-scale assessments (LSAs) of student achievement. These techniques often represent a blend of procedures from such diverse fields as experimental design, combinatorial optimization, particle physics, or neural networks. However, despite the theoretical advances in the field, there still exists a surprising scarcity of well-documented test designs in which all factors that have guided design decisions are explicitly and clearly communicated. This paper therefore has two goals. First, a brief summary of relevant key terms, as well as experimental designs and automated test assembly routines in LSA, is given. Second, conceptual and methodological steps in designing the assessment of the Austrian educational standards in mathematics are described in detail. The test design was generated using a two-step procedure, starting at the item block level and continuing at the item level. Initially, a partially balanced incomplete item block design was generated using simulated annealing, whereas in a second step, items were assigned to the item blocks using mixed-integer linear optimization in combination with a shadow-test approach.


Author(s):  
Myrna FLORES ◽  
Matic GOLOB ◽  
Doroteja MAKLIN ◽  
Christopher TUCCI

In recent years, the way organizations innovate and develop new solutions has changed considerably. Moving from ‘behind the closed doors’ style of innovating to open innovation where collaboration with outsiders is encouraged, organizations are in the pursuit of more effective ways to accelerate their innovation outcomes. As a result, organizations are establishing creative and entrepreneurial ecosystems, which not only empower employees but also involve many others to co-create new solutions. In this paper, we present a methodology for organizing hackathons, i.e. competition-based events where small teams work over a short period of time to ideate, design, prototype and test their ideas following a user-centric approach to solve a specific challenge. This paper also provides insights into two different hackathons organized in the United Kingdom, and Mexico, as well as a series of 5 hackathons organized in Argentina, Mexico, Switzerland, United Kingdom and in Senegal.


Author(s):  
Juan David ROLDAN ACEVEDO ◽  
Ida TELALBASIC

In recent history, different design approaches have been entering fields like management and strategy to improve product development and service delivery. Specifically, entrepreneurship has adopted a user-centric mindset in methodologies like the business canvas model and the value proposition canvas which increases the awareness of the users’ needs when developing solutions. What happens when a service design approach is used to understand the entrepreneurs’ experience through the creation of their startups? Recent literature suggests that entrepreneurial activity and success is conditioned by their local entrepreneurship ecosystem. This study investigates the Entrepreneurship Ecosystem of Medellín, Colombia - an ecosystem in constant growth but that lacks qualitative analysis. The sample consists of 12 entrepreneurs in early-stage phase. The data was gathered with two design research methods: Cultural Probes and Semi-structured interviews. The analysis of the information collected facilitated the development of 4 insights about the entrepreneurs and an experience map to visualise and interpret their journey to create a startup. The results of this study reflected the implications of the ecosystem, the explanation of the users’ perceptions and awareness and propose a set of ideas to the local government to improve the experience of undertaking a startup in Medellín.


Author(s):  
P. Sudheer ◽  
T. Lakshmi Surekha

Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been to secure the cloud storage. Data content privacy. A semi anonymous privilege control scheme AnonyControl to address not only the data privacy. But also the user identity privacy. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi anonymity. The  Anonymity –F which fully prevent the identity leakage and achieve the full anonymity.


The farming system in West Bengal is being shifted by integration between the set of cash crops and the main food harvest process. This change in diversified farming systems, where smallholders have a production base in rice can complement production; affect technical efficiency and farm performance. The goal of this study was to investigate the status of crop diversification on smallholders in West Bengal. First, crop diversification regions were developed in West Bengal based on the Herfindahl index, which were categorized into three regions. Three sample districts were studied separately at the block level, and 915 small farmers from 41 sample villages of 9 sample blocks were interviewed through a good structure questionnaire for field studies from the sample districts. West Bengal was gradually moving towards multiple crop production. Furthermore, increasing rice production reduced the marginal use of inputs for the production of other crops. Farming and other vital factors such as HYVs area to GCA, average holding size and per capita income in some districts of West Bengal can be identified as determinants of crop diversification.


The study was conducted using purposive cum random sampling technique and two hundred respondents comprised of 100 each borrowers and non-borrowers were selected from two block of district including marginal, small and medium categories of farm size. Primary data were collected through personal interview technique and required secondary information was taken from the record available at district and block level. Simple tabular and functional analysis and Garrett ranking were done to draw inferences. As per the result obtained from the study, no much difference was seen between the resource use efficiency of borrower and non-borrower farms and constraints faced by borrower. Since banana is a cash crop and it needs initial costs for its establishment, and after harvesting the crop regular source of income was generated by selling of suckers (seed) plant and its fruits. It’s by-product, leaves, etc. also used for various purposes. Minute inspection of the analysis showed that finance played important role for initiating the cultivation of banana crops showed the resource use efficiency that there is no considerable difference found on sample farms of borrower and non-borrower categories. Constraints faced by majority of the farmers were mainly delay in disbursement of loan and lack of the repayment period insufficient and improper management for withdraws on KCC.


Sign in / Sign up

Export Citation Format

Share Document