期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
Medi-Block Record Secure Data Sharing in Healthcare System:Issues,Solutions and Challenges
1
作者 Zuriati Ahmad Zukarnain Amgad Muneer +1 位作者 Nur Atirah Mohamad Nassir Akram A。Almohammedi 《Computer Systems Science & Engineering》 SCIE EI 2023年第12期2725-2740,共16页
With the advancements in the era of artificial intelligence,blockchain,cloud computing,and big data,there is a need for secure,decentralized medical record storage and retrieval systems.While cloud storage solves stor... With the advancements in the era of artificial intelligence,blockchain,cloud computing,and big data,there is a need for secure,decentralized medical record storage and retrieval systems.While cloud storage solves storage issues,it is challenging to realize secure sharing of records over the network.Medi-block record in the healthcare system has brought a new digitalization method for patients’medical records.This centralized technology provides a symmetrical process between the hospital and doctors when patients urgently need to go to a different or nearby hospital.It enables electronic medical records to be available with the correct authentication and restricts access to medical data retrieval.Medi-block record is the consumer-centered healthcare data system that brings reliable and transparent datasets for the medical record.This study presents an extensive review of proposed solutions aiming to protect the privacy and integrity of medical data by securing data sharing for Medi-block records.It also aims to propose a comprehensive investigation of the recent advances in different methods of securing data sharing,such as using Blockchain technology,Access Control,Privacy-Preserving,Proxy Re-Encryption,and Service-On-Chain approach.Finally,we highlight the open issues and identify the challenges regarding secure data sharing for Medi-block records in the healthcare systems. 展开更多
关键词 Medi-block record healthcare system Blockchain technology secure data sharing
下载PDF
A distributed authentication and authorization scheme for in-network big data sharing 被引量:3
2
作者 Ruidong Li Hitoshi Asaeda +1 位作者 Jie Li Xiaoming Fu 《Digital Communications and Networks》 SCIE 2017年第4期226-235,共10页
Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, w... Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, where big data is cached ubiquitously in the network and retrieved using data names. However, existing authentication and authorization schemes rely mostly on centralized servers to provide certification and mediation services for data retrieval. This causes considerable traffic overhead for the secure distributed sharing of data. To solve this problem, we employ identity-based cryptography (IBC) to propose a Distributed Authentication and Authorization Scheme (DAAS), where an identity-based signature (IBS) is used to achieve distributed verifications of the identities of publishers and users. Moreover, Ciphertext-Policy Attribnte-based encryption (CP-ABE) is used to enable the distributed and fine-grained authorization. DAAS consists of three phases: initialization, secure data publication, and secure data retrieval, which seamlessly integrate authentication and authorization with the in- terest/data communication paradigm in ICN. In particular, we propose trustworthy registration and Network Operator and Authority Manifest (NOAM) dissemination to provide initial secure registration and enable efficient authentication for global data retrieval. Meanwhile, Attribute Manifest (AM) distribution coupled with automatic attribute update is proposed to reduce the cost of attribute retrieval. We examine the performance of the proposed DAAS, which shows that it can achieve a lower bandwidth cost than existing schemes. 展开更多
关键词 Big data security Authentication ACCESS control In-network data sharing Information-centric network
下载PDF
Building a Trust Model for Secure Data Sharing(TM-SDS)in Edge Computing Using HMAC Techniques
3
作者 K.Karthikeyan P.Madhavan 《Computers, Materials & Continua》 SCIE EI 2022年第6期4183-4197,共15页
With the rapid growth of Internet of Things(IoT)based models,and the lack amount of data makes cloud computing resources insufficient.Hence,edge computing-based techniques are becoming more popular in present research... With the rapid growth of Internet of Things(IoT)based models,and the lack amount of data makes cloud computing resources insufficient.Hence,edge computing-based techniques are becoming more popular in present research domains that makes data storage,and processing effective at the network edges.There are several advanced features like parallel processing and data perception are available in edge computing.Still,there are some challenges in providing privacy and data security over networks.To solve the security issues in Edge Computing,Hash-based Message Authentication Code(HMAC)algorithm is used to provide solutions for preserving data from various attacks that happens with the distributed network nature.This paper proposed a Trust Model for Secure Data Sharing(TM-SDS)with HMAC algorithm.Here,data security is ensured with local and global trust levels with the centralized processing of cloud and by conserving resources effectively.Further,the proposed model achieved 84.25%of packet delivery ratio which is better compared to existing models in the resulting phase.The data packets are securely transmitted between entities in the proposed model and results showed that proposed TM-SDS model outperforms the existing models in an efficient manner. 展开更多
关键词 Secure data sharing edge computing global trust levels parallel processing
下载PDF
浅析全球安全倡议的实施路径
4
作者 贾文山 孙宸 《Contemporary International Relations》 2023年第4期73-99,共27页
In the current era of changes unseen in a century,humanity is caught up in a deteriorating security environment on a global scale.By proposing the Global Security Initiative(GSI),China has offered its wisdom and a sol... In the current era of changes unseen in a century,humanity is caught up in a deteriorating security environment on a global scale.By proposing the Global Security Initiative(GSI),China has offered its wisdom and a solution toward building a community of shared security for humanity.After a brief review of the historical evolution of the global security mechanism,the present study analyzes the main ideas and contemporary values making up the GSI.Meanwhile,based on the approaches proposed in and the spirit of the GSI Concept Paper,the authors uncover the dialectical relationship between the GSI,the Global Development Initiative,and the Global Civilization Initiative,which are all included in the Law on Foreign Relations of the People’s Republic of China adopted on June 28,2023.Furthermore,the authors recommend three practical paths toward implementing the GSI:a path toward shortterm goals,a path toward medium-term goals,and a path toward longterm goals.The success of the GSI needs the concerted efforts of all countries.China is not only an active advocate of the GSI but has also been striving to enhance its capability in safeguarding global security,implement the GSI vigorously,and spearhead a new type of global governance. 展开更多
关键词 Global security Initiative global governance community of shared security for mankind
下载PDF
LRChain:data protection and sharing method of learning archives based on consortium blockchain
5
作者 Lan Lina Gao Yuhan +1 位作者 Shi Ruisheng Wu Fenfen 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2024年第4期28-42,共15页
Learning archives management in traditional systems faces challenges such as inadequate security,weak tamper resistance,and limited sharing capabilities.To address these issues,this paper proposes LRChain,a method bas... Learning archives management in traditional systems faces challenges such as inadequate security,weak tamper resistance,and limited sharing capabilities.To address these issues,this paper proposes LRChain,a method based on consortium blockchain,for lifelong learning archives data protection and sharing.LRChain employs a combination of on-chain and off-chain cooperative storage using a consortium chain and inter planetary file system(IPFS)to enhance data security and availability.It also enables fine-grained verification of learning archives through selective disclosure principles,ensuring privacy protection of sensitive data.Furthermore,an attributebased encryption(ABE)algorithm is utilized to establish authorized access control for learning archives,facilitating safe and trusted sharing.Experimental evaluations and security analyses demonstrate that this method exhibits decentralization,strong security,tamper resistance,and performs well,effectively meeting the requirements for secure sharing of learning archive data. 展开更多
关键词 learning archives consortium blockchain collaborative storage secure sharing
原文传递
Blockchain-Based Secured IPFS-Enable Event Storage Technique With Authentication Protocol in VANET 被引量:5
6
作者 Sanjeev Kumar Dwivedi Ruhul Amin Satyanarayana Vollala 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第12期1913-1922,共10页
In recent decades,intelligent transportation systems(ITS)have improved drivers’safety and have shared information(such as traffic congestion and accidents)in a very efficient way.However,the privacy of vehicles and t... In recent decades,intelligent transportation systems(ITS)have improved drivers’safety and have shared information(such as traffic congestion and accidents)in a very efficient way.However,the privacy of vehicles and the security of event information is a major concern.The problem of secure sharing of event information without compromising the trusted third party(TTP)and data storage is the main issue in ITS.Blockchain technologies can resolve this problem.A work has been published on blockchain-based protocol for secure sharing of events and authentication of vehicles.This protocol addresses the issue of the safe storing of event information.However,authentication of vehicles solely depends on the cloud server.As a result,their scheme utilizes the notion of partially decentralized architecture.This paper proposes a novel decentralized architecture for the vehicular ad-hoc network(VANET)without the cloud server.This work also presents a protocol for securing event information and vehicle authentication using the blockchain mechanism.In this protocol,the registered user accesses the event information securely from the interplanetary file system(IPFS).We incorporate the IPFS,along with blockchain,to store the information in a fully distributed manner.The proposed protocol is compared with the state-of-the-art.The comparison provides desirable security at a reasonable cost.The evaluation of the proposed smart contract in terms of cost(GAS)is also discussed. 展开更多
关键词 AUTHENTICATION blockchain interplanetary file system(IPFS) secure information sharing security
下载PDF
Blockchain data secure sharing protocol based on threshold Paillier algorithm
7
作者 Likai Jia Xiubo Chen +3 位作者 Luxi Liu Xiaoge Wang Ke Xiao Gang Xu 《High-Confidence Computing》 EI 2023年第4期7-12,共6页
With the development of Internet technology,secure storage and secure sharing of data have become increasingly important.Traditional data sharing schemes exist a series of problems including lack of security and low e... With the development of Internet technology,secure storage and secure sharing of data have become increasingly important.Traditional data sharing schemes exist a series of problems including lack of security and low efficiency.In this paper,we construct a secure and efficient data sharing scheme based on threshold Paillier algorithm and blockchain technology,which achieves secure data storage and sharing without a third-party institution.Firstly,we propose a(t,l)threshold Paillier blockchain data sharing scheme,which effectively prevents decryption failures caused by the loss of a single node’s private key.Secondly,we propose a combined on-chain and off-chain data storage scheme,we store the ciphertext on the cloud server and the ciphertext hash value on the blockchain,which not only ensures the integrity of the data but also solves the storage limitation problem on the blockchain.Finally,we use the simulation paradigm to prove the security of the scheme in the semi-honest model.The discussion results of the comparison and the analysis of performance show that the blockchain data security sharing scheme proposed in this paper has lower computational overhead and higher security than other similar schemes. 展开更多
关键词 Blockchain Secure sharing data Privacy protection Threshold Paillier cryptosystem
原文传递
Secure Sensitive Data Sharing on a Big Data Platform 被引量:12
8
作者 Xinhua Dong Ruixuan Li +3 位作者 Heng He Wanwan Zhou Zhengyuan Xue Hao Wu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2015年第1期72-80,共9页
Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services.Howev... Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services.However, secure data sharing is problematic. This paper proposes a framework for secure sensitive data sharing on a big data platform, including secure data delivery, storage, usage, and destruction on a semi-trusted big data sharing platform. We present a proxy re-encryption algorithm based on heterogeneous ciphertext transformation and a user process protection method based on a virtual machine monitor, which provides support for the realization of system functions. The framework protects the security of users' sensitive data effectively and shares these data safely. At the same time, data owners retain complete control of their own data in a sound environment for modern Internet information security. 展开更多
关键词 secure sharing sensitive data big data proxy re-encryption private space
原文传递
Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing 被引量:2
9
作者 王亮亮 陈克非 +1 位作者 毛贤平 王永涛 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期398-405,共8页
In current cloud computing system, large amounts of sensitive data are shared to other cloud users. To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencry... In current cloud computing system, large amounts of sensitive data are shared to other cloud users. To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencryption (PRE) as the cloud data encryption technique. In a PRE system, a semi-trusted proxy can transform a ciphertext under one public key into a ciphertext of the same message under another public key, but the proxy cannot gain any information about the message. In this paper, we propose a certificateless PRE (CL-PRE) scheme without pairings. The security of the proposed scheme can be proved to be equivalent to the computational Dire- Hellman (CDH) problem in the random oracle model. Compared with other existing CL-PRE schemes, our scheme requires less computation cost and is significantly more efficient. The new scheme does not need the public key certificates to guarantee validity of public keys and solves the key escrow problem in identity-based public key cryptography. 展开更多
关键词 cloud computing secure data sharing proxy re-encryption(PRE) certificateless encryption key escrow computational Diffie-Hellman(CDH) problem random oracle
原文传递
A potential application in quantum networks-Deterministic quantum operation sharing schemes with Bell states 被引量:1
10
作者 Ke Jia Zhang Long Zhang +1 位作者 Ting Ting Song Ying Hui Yang 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2016年第6期41-48,共8页
In this paper, we propose certain different design ideas on a novel topic in quantum cryptography — quantum operation sharing(QOS). Following these unique ideas, three QOS schemes, the "HIEC"(The scheme who... In this paper, we propose certain different design ideas on a novel topic in quantum cryptography — quantum operation sharing(QOS). Following these unique ideas, three QOS schemes, the "HIEC"(The scheme whose messages are hidden in the entanglement correlation), "HIAO"(The scheme whose messages are hidden with the assistant operations) and "HIMB"(The scheme whose messages are hidden in the selected measurement basis), have been presented to share the single-qubit operations determinately on target states in a remote node. These schemes only require Bell states as quantum resources. Therefore, they can be directly applied in quantum networks, since Bell states are considered the basic quantum channels in quantum networks. Furthermore, after analyse on the security and resource consumptions, the task of QOS can be achieved securely and effectively in these schemes. 展开更多
关键词 quantum operation sharing quantum secret sharing quantum secure direct communication quantum networks
原文传递
Building a Community of Shared Destiny for Common Security: Some Observations on its Construction Path
11
作者 Guo Chu Xu Jin 《Peace》 2017年第2期40-54,共15页
A community of shared destiny(whose content is the same as community of shared future, an update translation) is the guiding principle and strategic objective of China's diplomacy, and is just, peaceful, inclusive... A community of shared destiny(whose content is the same as community of shared future, an update translation) is the guiding principle and strategic objective of China's diplomacy, and is just, peaceful, inclusive, comprehensive and scientific. It reflects a rational concept of how a rising China handles relations with the outside world. It rejects analysis and understanding of simple traditional thinking that a strong power is bound to seek hegemony. However, the Chinese diplomacy also needs Chinese thinking and perspectives. With analysis eclecticism and incorporated process constructivism to carry out study on the international relations, it can be found that the community of shared destiny is an economic, political and security order, is also a concept order; while a community of shared interests is its foundation, a community of shared security is its guarantee, the common knowledge composes its highest standard. Common security is the important guarantee and strategic goal for the community of shared destiny, i.e. it shows that the peaceful development strategy highlights the reasonable security demands of others China respects; win-win cooperation principle reflects the importance of cooperative security in the international pattern of deepening interdependence; partnership strategy shows diplomatic efforts of Chinese exploration and practice of the new security concept beyond "security alliance". 展开更多
关键词 of it is Some Observations on its Construction Path Building a Community of Shared Destiny for Common security for in on
原文传递
A European Investment Boom?
12
作者 Bai Shi 《Beijing Review》 2015年第32期18-19,共2页
Chinese investors seek opportunities in Europe At present,Chinese investment in Europe is entering a period of rapid growth.China and the European Union(EU)are discussing how to dock their strategic economic develop... Chinese investors seek opportunities in Europe At present,Chinese investment in Europe is entering a period of rapid growth.China and the European Union(EU)are discussing how to dock their strategic economic development and investment plans together,Shen Danyang,spokesperson of China’s Ministry of Commerce,said at a press briefing in Beijing on July 7. 展开更多
关键词 entering strategic summit participation expand assets Securities shares boost telecom
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部