The online social networks(OSNs) offer attractive means for social interactions and data sharing, as well as raise a number of security and privacy issues. Although current solutions propose to encrypt data before s...The online social networks(OSNs) offer attractive means for social interactions and data sharing, as well as raise a number of security and privacy issues. Although current solutions propose to encrypt data before sharing, the access control of encrypted data has become a challenging task. Moreover, multiple owners may enforce different access policy to the same data because of their different privacy concerns. A digital rights management(DRM) scheme is proposed for encrypted data in OSNs. In order to protect users' sensitive data, the scheme allows users outsource encrypted data to the OSNs service provider for sharing and customize the access policy of their data based on ciphertext-policy attribute-based encryption. Furthermore, the scheme presents a multiparty access control model based on identity-based broadcast encryption and ciphertext-policy attribute-based proxy re-encryption, which enables multiple owners, such as tagged users who appear in a single data, customize the access policy collaboratively, and also allows the disseminators update the access policy if their attributes satisfy the existing access policy. Security analysis and comparison indicate that the proposed scheme is secure and efficient.展开更多
Cloud computing has reached the peak of Gartner hype cycle,and now the focus of the whole telecom industry is the ability to scale data storage with minimal investment.But data privacy and communication issues will oc...Cloud computing has reached the peak of Gartner hype cycle,and now the focus of the whole telecom industry is the ability to scale data storage with minimal investment.But data privacy and communication issues will occur with the increment of the cloud data storage.The key privacy concern for scalability is caused by the dynamic membership allocation and multi-owner data sharing.This paper addresses the issues faced by multiple owners through a mutual authentication mechanism using the Enhanced Elliptic Curve Diffie-Hellman(EECDH)key exchange protocol along with the Elliptic Curve Digital Signature Algorithm(ECDSA).The proposed EECDH scheme is used to exchange the secured shared key among multiple owners and also to eliminate the Man-In-The-Middle(MITM)attacks with less computational complexity.By leveraging these algorithms,the integrity of data sharing among multiple owners is ensured.The EECDH improves the level of security only slightly increasing the time taken to encrypt and decrypt the data,and it is secured against the MITM attacks,which is experimented using the AVISPA tool.展开更多
Many organizations apply cloud computing to store and effectively process data for various applications.The user uploads the data in the cloud has less security due to the unreliable verification process of data integ...Many organizations apply cloud computing to store and effectively process data for various applications.The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity.In this research,an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data.Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data.Merkle Hash tree provides the efficient mapping of data and easily identifies the changesmade in the data due to proper structure.The developed model supports privacy-preserving public auditing to provide a secure cloud storage system.The data owners upload the data in the cloud and edit the data using the private key.An enhanced Merkle hash tree method stores the data in the cloud server and splits it into batches.The data files requested by the data owner are audit by a third-party auditor and the multiowner authentication method is applied during the modification process to authenticate the user.The result shows that the proposed method reduces the encryption and decryption time for cloud data storage by 2–167 ms when compared to the existing Advanced Encryption Standard and Blowfish.展开更多
A microgrid(MG)refers to a set of loads,generation resources and energy storage systems acting as a controllable load or a generator to supply power and heating to a local area.The MG-generated power management is a c...A microgrid(MG)refers to a set of loads,generation resources and energy storage systems acting as a controllable load or a generator to supply power and heating to a local area.The MG-generated power management is a central topic for MG design and operation.The existence of dispersed generation(DG)resources has faced MG management with new issues.Depending on the level of exchanges between an MG and the main grid,the MG operation states can be divided into independent or grid-connected ones.Energy management in MGs aims to supply power at the lowest cost for optimal load response.This study examines MG energy management in two operational modes of islanded and grid-connected,and proposes a structure with two control layers(primary and secondary)for energy management.At the principal level of control,the energy management system is determined individually for all MG by taking into consideration the probability constraints and RES uncertainty by the Weibull the probability density function(PDF),generation resources’power as well as the generation surplus and deficit of each MG.Then,the information of the power surplus and deficit of each MG must be sent to the central energy management system.To confirm the proposed structure,a case system with two MGs and a condensive load is simulated by using a multi-time harmony search algorithm.Several scenarios are applied to evaluate the performance of this algorithm.The findings clearly show the effectiveness of the proposed system in the energy management of several MGs,leading to the optimal performance of the resources per MG.Moreover,the proposed control scheme properly controls the MG and grid’s performance in their interactions and offers a high level of robustness,stable behavior under different conditions and high quality of power supply.展开更多
基金supported by the National Natural Science Foundation of China(60803157,90812001,61272519)
文摘The online social networks(OSNs) offer attractive means for social interactions and data sharing, as well as raise a number of security and privacy issues. Although current solutions propose to encrypt data before sharing, the access control of encrypted data has become a challenging task. Moreover, multiple owners may enforce different access policy to the same data because of their different privacy concerns. A digital rights management(DRM) scheme is proposed for encrypted data in OSNs. In order to protect users' sensitive data, the scheme allows users outsource encrypted data to the OSNs service provider for sharing and customize the access policy of their data based on ciphertext-policy attribute-based encryption. Furthermore, the scheme presents a multiparty access control model based on identity-based broadcast encryption and ciphertext-policy attribute-based proxy re-encryption, which enables multiple owners, such as tagged users who appear in a single data, customize the access policy collaboratively, and also allows the disseminators update the access policy if their attributes satisfy the existing access policy. Security analysis and comparison indicate that the proposed scheme is secure and efficient.
文摘Cloud computing has reached the peak of Gartner hype cycle,and now the focus of the whole telecom industry is the ability to scale data storage with minimal investment.But data privacy and communication issues will occur with the increment of the cloud data storage.The key privacy concern for scalability is caused by the dynamic membership allocation and multi-owner data sharing.This paper addresses the issues faced by multiple owners through a mutual authentication mechanism using the Enhanced Elliptic Curve Diffie-Hellman(EECDH)key exchange protocol along with the Elliptic Curve Digital Signature Algorithm(ECDSA).The proposed EECDH scheme is used to exchange the secured shared key among multiple owners and also to eliminate the Man-In-The-Middle(MITM)attacks with less computational complexity.By leveraging these algorithms,the integrity of data sharing among multiple owners is ensured.The EECDH improves the level of security only slightly increasing the time taken to encrypt and decrypt the data,and it is secured against the MITM attacks,which is experimented using the AVISPA tool.
基金The Universiti Kebangsaan Malaysia(UKM)Research Grant Scheme FRGS/1/2020/ICT03/UKM/02/6 and GGPM-2020-028 funded this research.
文摘Many organizations apply cloud computing to store and effectively process data for various applications.The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity.In this research,an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data.Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data.Merkle Hash tree provides the efficient mapping of data and easily identifies the changesmade in the data due to proper structure.The developed model supports privacy-preserving public auditing to provide a secure cloud storage system.The data owners upload the data in the cloud and edit the data using the private key.An enhanced Merkle hash tree method stores the data in the cloud server and splits it into batches.The data files requested by the data owner are audit by a third-party auditor and the multiowner authentication method is applied during the modification process to authenticate the user.The result shows that the proposed method reduces the encryption and decryption time for cloud data storage by 2–167 ms when compared to the existing Advanced Encryption Standard and Blowfish.
文摘A microgrid(MG)refers to a set of loads,generation resources and energy storage systems acting as a controllable load or a generator to supply power and heating to a local area.The MG-generated power management is a central topic for MG design and operation.The existence of dispersed generation(DG)resources has faced MG management with new issues.Depending on the level of exchanges between an MG and the main grid,the MG operation states can be divided into independent or grid-connected ones.Energy management in MGs aims to supply power at the lowest cost for optimal load response.This study examines MG energy management in two operational modes of islanded and grid-connected,and proposes a structure with two control layers(primary and secondary)for energy management.At the principal level of control,the energy management system is determined individually for all MG by taking into consideration the probability constraints and RES uncertainty by the Weibull the probability density function(PDF),generation resources’power as well as the generation surplus and deficit of each MG.Then,the information of the power surplus and deficit of each MG must be sent to the central energy management system.To confirm the proposed structure,a case system with two MGs and a condensive load is simulated by using a multi-time harmony search algorithm.Several scenarios are applied to evaluate the performance of this algorithm.The findings clearly show the effectiveness of the proposed system in the energy management of several MGs,leading to the optimal performance of the resources per MG.Moreover,the proposed control scheme properly controls the MG and grid’s performance in their interactions and offers a high level of robustness,stable behavior under different conditions and high quality of power supply.