Explore chapters and articles related to this topic
Attribute-Based Encryption
Published in Khaleel Ahmad, M. N. Doja, Nur Izura Udzir, Manu Pratap Singh, Emerging Security Algorithms and Techniques, 2019
Tanvi Gautam, Aditya Thakkar, Nitish Pathak
There is a difference between KeyGen() algorithms of ABE scheme and KP-ABE scheme. The private key generation of the user is according to the access structure. The decrypt() algorithm is also different as the KeyGen() algorithm is different from ABE scheme. During the decryption, the attributes of encrypted data are used to execute decrypt node function (Goyal, Jain, Pandey, & Sahai, 2008).
Securing Cloud Data
Published in Olivier Terzo, Lorenzo Mossucca, Cloud Computing with e-Science Applications, 2017
KeyGen(1k) → (pk, sk): This probabilistic algorithm is run by the client. It takes a security parameter 1k and returns public key pk and secret key sk.
Guarded dual authentication based DRM with resurgence dynamic encryption techniques
Published in Enterprise Information Systems, 2019
Neha Agarwal, Ajay Rana, J.P. Pandey
Nowadays internet-based computing is one of the developing techniques with a high infrastructure. To share the file securely there are several mature and powerful options, among them one of the leading concept is cloud which shares the data, stores and retrieves the data from cloud through network by still creating a problem of security lacking, sharing efficiency etc. For data security, in earlier stages a product key with a typically alphanumerical serial number is used to represent a license for a particular piece of data, serves a similar function. During the installation process or launch for the data, the user is asked to input the key. If the key correctly corresponds to a valid license (typically via internal algorithms),the key is accepted, then the user who bought can continue. In modern practice, product keys are typically combined with other DRM practices (such as online ‘activation’), as the data could be cracked to run without a product key, or ‘keygen’ programs could be developed to generate keys that would be accepted. But the computation time and other similar process meets a great risk. So to overcome the needs, we adopt a concept of security framework with two fold authentication in DRM. The two fold authentication protocol works based on the identification of the cloud user and validation based on the identified user through mutual authentication. Then for a strongest access control, Dynamic Unidirectional Proxy Re-Encryption is used which follows an integrity checking protocol. At the end a novel algorithm is utilized to store the data in cloud server and remote server so that if there is any loss of main file there is always a backup in the remote server. The Figure 1 displays the process of this proposed method.