期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs
1
作者 Nagaraju Pacharla K.Srinivasa Reddy 《Computers, Materials & Continua》 SCIE EI 2024年第5期3089-3110,共22页
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.Th... With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations. 展开更多
关键词 Vehicular ad-hoc networks data outsourcing privacy preservation CRYPTOGRAPHY keys trusted certified auditors data security
下载PDF
Comprehensive evaluation of key management hierarchies for outsourced data
2
作者 Naveen Kumar Anish Mathuria 《Cybersecurity》 CSCD 2019年第1期150-166,共17页
Key management is an essential component of a cryptographic access control system with a large number of resources.It manages the secret keys assigned to the system entities in such a way that only authorized users ca... Key management is an essential component of a cryptographic access control system with a large number of resources.It manages the secret keys assigned to the system entities in such a way that only authorized users can access a resource.Read access control allows read access of a resource by the authorized users and disallows others.An important objective of a key management is to reduce the secret key storage with each authorized user.To this end,there exist two prominent types of key management hierarchy with single key storage per user used for read access control in data outsourcing scenario:user-based and resource-based.In this work,we analyze the two types of hierarchy with respect to static hierarchy characteristics and dynamic operations such as adding or revoking user authorization.Our analysis shows that the resource-based hierarchies can be a better candidate which is not given equal emphasis in the literature.A new heuristic for minimizing the key management hierarchy is introduced that makes it practical in use even for a large number of users and resources.The performance evaluation of dynamic operations such as adding or revoking a user’s read subscription is shown experimentally to support our analytical results. 展开更多
关键词 Key management hierarchy data outsourcing Access control
原文传递
Comprehensive evaluation of key management hierarchies for outsourced data
3
作者 Naveen Kumar Anish Mathuria 《Cybersecurity》 2018年第1期425-441,共17页
Key management is an essential component of a cryptographic access control system with a large number of resources.It manages the secret keys assigned to the system entities in such a way that only authorized users ca... Key management is an essential component of a cryptographic access control system with a large number of resources.It manages the secret keys assigned to the system entities in such a way that only authorized users can access a resource.Read access control allows read access of a resource by the authorized users and disallows others.An important objective of a key management is to reduce the secret key storage with each authorized user.To this end,there exist two prominent types of key management hierarchy with single key storage per user used for read access control in data outsourcing scenario:user-based and resource-based.In this work,we analyze the two types of hierarchy with respect to static hierarchy characteristics and dynamic operations such as adding or revoking user authorization.Our analysis shows that the resource-based hierarchies can be a better candidate which is not given equal emphasis in the literature.A new heuristic for minimizing the key management hierarchy is introduced that makes it practical in use even for a large number of users and resources.The performance evaluation of dynamic operations such as adding or revoking a user’s read subscription is shown experimentally to support our analytical results. 展开更多
关键词 Key management hierarchy data outsourcing Access control
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部