Mostrar el registro sencillo del ítem

dc.contributor.authorKumar, Tarun
dc.contributor.authorKumar, Prabhat
dc.contributor.authorNamasudra, Suyel
dc.date2024-05
dc.date.accessioned2024-06-12T13:32:42Z
dc.date.available2024-06-12T13:32:42Z
dc.identifier.citationT. Kumar, P. Kumar, S. Namasudra. User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment, International Journal of Interactive Multimedia and Artificial Intelligence, (2024), http://dx.doi.org/10.9781/ijimai.2024.05.001es_ES
dc.identifier.urihttps://reunir.unir.net/handle/123456789/16736
dc.description.abstractNowadays, a lot of data is stored in the cloud for sharing purposes across various domains. The increasing number of security issues with cloud data raises confidentiality concerns about keeping these stored or shared data. Advanced encryption and decryption techniques in cloud computing environments can be considered useful to achieve this aspect. However, an unresolved yet critical challenge in cloud data-sharing systems is the revocation of malicious users. One of the common methods for revocation involves periodically updating users' private keys. This approach increases the workload of the Key Generation Center (KGC) as the number of users increases. In this work, an efficient Revocable Identity-Based Signature (RIBS) scheme is proposed, wherein the revocation functionality is delegated to an External Revocation Server (ERS). This proposed scheme allows only the non-revoked users to access the system resources, thus, providing restricted access control. Here, the ERS generates a secret time key for signature generation based on a revoked user list. In the proposed method, a user uses its private key and secret time key to sign a message. Furthermore, to maintain data confidentiality, symmetric encryption and Elliptic Curve Cryptography (ECC) based asymmetric encryption techniques are used before outsourcing data to the cloud server. The results illustrate that the proposed scheme outperforms some of the existing schemes by providing reduced computation costs.es_ES
dc.language.isoenges_ES
dc.publisherInternational Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI)es_ES
dc.relation.ispartofseries;In Press
dc.rightsopenAccesses_ES
dc.subjectcryptographyes_ES
dc.subjectdigital signaturees_ES
dc.subjectelliptic curve cryptographyes_ES
dc.subjectidentity-based signaturees_ES
dc.subjectrevocationes_ES
dc.subjectIJIMAIes_ES
dc.titleUser Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environmentes_ES
dc.typearticlees_ES
reunir.tag~IJIMAIes_ES
dc.identifier.doihttp://dx.doi.org/10.9781/ijimai.2024.05.001


Ficheros en el ítem

Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem