A secure and robust scheme for sharing confidential information in IoT systems
نویسندگان
چکیده
منابع مشابه
Authorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملAn Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...
متن کاملSecure Information Sharing in Mixed–Criticality Systems
In this paper we discuss the application of integrity models in a mixed–criticality system to enable the secure sharing of information. The sharing of resources and information enables cost savings. It is the main driving factor in integrated architectures which are used to implement mixed–criticality real-time systems. The major challenge of these systems is simple: low criticality application...
متن کاملRevisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme
In 2010, Resch and Plank proposed a computationally secure secret sharing scheme, called AONT-RS. We present a generalisation of their scheme and discuss two ways in which information is leaked if used to distribute small ciphertexts. We discuss how to prevent such leakage and provide a proof of computational privacy in the random oracle model. Next, we extend the scheme to be robust and prove ...
متن کاملA Visual Confidential Sharing Scheme for Multiple Proficient Systems by Cryptograpy without Pixel Extension
Preserving the privacy of digital biometric data (e.g., face images) stored in a central database has become of paramount importance. This work explores the possibility of using visual cryptography for imparting privacy to biometric data such as fingerprint images, iris codes, and face images. In the case of faces, a private face image is dithered into two host face images (known as sheets) tha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Ad Hoc Networks
سال: 2019
ISSN: 1570-8705
DOI: 10.1016/j.adhoc.2018.09.007