• Mi Re-Unir
    Búsqueda Avanzada
    JavaScript is disabled for your browser. Some features of this site may not work without it.
    Ver ítem 
    •   Inicio
    • UNIR REVISTAS
    • Revista IJIMAI
    • In Press
    • In Press
    • Ver ítem
    •   Inicio
    • UNIR REVISTAS
    • Revista IJIMAI
    • In Press
    • In Press
    • Ver ítem

    User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment

    Autor: 
    Kumar, Tarun
    ;
    Kumar, Prabhat
    ;
    Namasudra, Suyel
    Fecha: 
    05/2024
    Palabra clave: 
    cryptography; digital signature; elliptic curve cryptography; identity-based signature; revocation; IJIMAI
    Revista / editorial: 
    International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI)
    Citación: 
    T. Kumar, P. Kumar, S. Namasudra. User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment, International Journal of Interactive Multimedia and Artificial Intelligence, (2024), http://dx.doi.org/10.9781/ijimai.2024.05.001
    Tipo de Ítem: 
    article
    URI: 
    https://reunir.unir.net/handle/123456789/16736
    DOI: 
    http://dx.doi.org/10.9781/ijimai.2024.05.001
    Open Access
    Resumen:
    Nowadays, a lot of data is stored in the cloud for sharing purposes across various domains. The increasing number of security issues with cloud data raises confidentiality concerns about keeping these stored or shared data. Advanced encryption and decryption techniques in cloud computing environments can be considered useful to achieve this aspect. However, an unresolved yet critical challenge in cloud data-sharing systems is the revocation of malicious users. One of the common methods for revocation involves periodically updating users' private keys. This approach increases the workload of the Key Generation Center (KGC) as the number of users increases. In this work, an efficient Revocable Identity-Based Signature (RIBS) scheme is proposed, wherein the revocation functionality is delegated to an External Revocation Server (ERS). This proposed scheme allows only the non-revoked users to access the system resources, thus, providing restricted access control. Here, the ERS generates a secret time key for signature generation based on a revoked user list. In the proposed method, a user uses its private key and secret time key to sign a message. Furthermore, to maintain data confidentiality, symmetric encryption and Elliptic Curve Cryptography (ECC) based asymmetric encryption techniques are used before outsourcing data to the cloud server. The results illustrate that the proposed scheme outperforms some of the existing schemes by providing reduced computation costs.
    Mostrar el registro completo del ítem
    Ficheros en el ítem
    icon
    Nombre: User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment.pdf
    Tamaño: 868.8Kb
    Formato: application/pdf
    Ver/Abrir
    Este ítem aparece en la(s) siguiente(s) colección(es)
    • In Press

    Estadísticas de uso

    Año
    2012
    2013
    2014
    2015
    2016
    2017
    2018
    2019
    2020
    2021
    2022
    2023
    2024
    2025
    2026
    Vistas
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    133
    186
    48
    Descargas
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    79
    265
    52

    Ítems relacionados

    Mostrando ítems relacionados por Título, autor o materia.

    • Introduction to the special section on advances of machine learning in cybersecurity (VSI-mlsec) 

      Namasudra, Suyel; González-Crespo, Rubén ; Kumar, Sathish (Computers and Electrical Engineering, 2022)
      With the rapid advancement of emerging technologies, such as Internet of Things (IoT), cloud computing, and many more, a huge amount of data is generated and processed in daily life. As these technologies are based on the ...
    • A Smart Healthcare System Using Consumer Electronics and Federated Learning to Automatically Diagnose Diabetic Foot Ulcers 

      Das, Sujit Kumar; Moparthi, Nageswara Rao; Namasudra, Suyel; González Crespo, Rubén; Taniar, David (UNIR, 01/03/2025)
      Privacy breaches on sensitive and widely distributed health data in consumer electronics (CE) demand novel strategies to protect privacy with correctness and proper operation maintenance. This work presents a scalable ...
    • A Smart Healthcare System Using Consumer Electronics and Federated Learning to Automatically Diagnose Diabetic Foot Ulcers 

      Das, Sujit Kumar; Moparthi, Nageswara Rao; Namasudra, Suyel; González Crespo, Rubén; Taniar, David (UNIR, 01/03/2025)
      Privacy breaches on sensitive and widely distributed health data in consumer electronics (CE) demand novel strategies to protect privacy with correctness and proper operation maintenance. This work presents a scalable ...

    Mi cuenta

    AccederRegistrar

    ¿necesitas ayuda?

    Manual de UsuarioContacto: reunir@unir.net

    Listar

    todo Re-UnirComunidades y coleccionesPor fecha de publicaciónAutoresTítulosPalabras claveTipo documentoTipo de accesoEsta colecciónPor fecha de publicaciónAutoresTítulosPalabras claveTipo documentoTipo de acceso






    Aviso Legal Política de Privacidad Política de Cookies Cláusulas legales RGPD
    © UNIR - Universidad Internacional de La Rioja
     
    Aviso Legal Política de Privacidad Política de Cookies Cláusulas legales RGPD
    © UNIR - Universidad Internacional de La Rioja