Enhancing Privacy Using Collaborative Attribute Encryption Techniques
نویسنده
چکیده
In the era where computers dominate the other facilities, it becomes even more productive once connected to the world with the help of internet. Although it possesses certain challenges to connect oneself to the world. The challenges of Authenticity, confidentiality, and anonymity and all of the notions of security with the concern aspects. Depending on the application the encryption techniques differs the most recent assortment that is the attribute based encryption, unlike traditional encryption technique this technique doesn’t reveals its identity Security tends to be the most important aspect when it comes to enter in the visual world thus the cryptographic technique is very much essential to be optimally developed so the transactions made cannot be read or changed in the network that is the data have to be securely traverse via internet, Attribute based cryptography techniques are dominating the aspects of security. The innovative use of attributes can improve the traditional techniques of data sharing which was by using trusted mediated servers. These attributes have been exploited to generate the public key and have been used as user’s access policy to restrict the user’s access. It is attribute-based, as it allows encrypting under logical combinations of attributes, that is, properties that users satisfy. It is hybrid, as it combines ciphertext policy attribute-based encryption (CP-ABE) with location-based encryption (LBE) on the level of symmetric keys. It supports encryption under expressive policies, since it can efficiently handle dynamic attributes with continuous values, such as location. Public key encryption techniques provide authenticity through digital signature and confidentiality with the help of public key encryption technique. Security also overcomes the bottleneck of centralization since there is no central authority, it works as distributed attribute based encryption where the load is well distributed among every participating node.
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملOn Using Encryption Techniques to Enhance Sticky Policies Enforcement
How to enforce privacy policies to protect sensitive personal data has become an urgent research topic for security researchers, as very little has been done in this field apart from some ad hoc research efforts. The sticky policy paradigm, proposed by Karjoth, Schunter, and Waidner, provides very useful inspiration on how we can protect sensitive personal data, but the enforcement is very weak...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملBrowse searchable encryption schemes: Classification, methods and recent developments
With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...
متن کاملA Secure Multiparty Product Protocol for Preserving the Privacy in Collaborative Data Mining
In the modern business world, collaborative data mining becomes especially important because of the mutual benefit it brings to the collaborators. During the collaboration, each party of the collaboration needs to share its data with other parties. If the parties don't care about their data privacy, the collaboration can be easily achieved. Privacy concerns parties, each having a private data s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016