Implementation of ID-based Audit Protocols to Enhance Security and Productivity
نویسندگان
چکیده
Cloud storage has gained increasing popularity, as it helps cloud users arbitrarily store and access the related outsourced data. Numerous public audit buildings have been presented to ensure data transparency. However, modern developments mostly constructed on key infrastructure. To achieve integrity, auditor must first authenticate legality of certificate, which adds an immense workload for auditor, in order that integrity is accomplished. The facilities anticipate quality should be regularly tracked minimize disruption saved maintain intactness stored remote server. One main problems individuals, though, how detect a term where people backup local files. Meanwhile, system often unlikely source-limited person perform inspection if overall file retrieved. In this work, stable effective ID-based auditing setting uses machine learning techniques proposed improve productivity enhance protection protocols. study tackles issue confidentiality reliability framework focused identity. idea already proved safe; its safety very relevant traditional presumption Computational Diffie–Hellman security assumption.
منابع مشابه
Design and Implementation of an Algorithm to Enhance Cloud Security
Cloud computing concept has been envisioned as architecture of the next generation for Information Technology (IT) enterprise. The Cloud computing idea offers with dynamic scalable resources provisioned as examine on the Internet. It allows access to remote computing services and users only have to pay for what they want to use, when they want to use it. But the security of the information whic...
متن کاملGeneralization of the Selective-ID Security Model for HIBE Protocols
We generalize the selective-ID security model for HIBE by introducing two new security models. Broadly speaking, both these models allow the adversary to commit to a set of identities and in the challenge phase choose any one of the previously committed identities. Two constructions of HIBE are presented which are secure in the two models. Further, we show that the HIBEs can be modified to obta...
متن کاملMiddleware for Automated Implementation of Security Protocols
We propose a middleware for automated implementation of security protocols for Web services. The proposed middleware consists of two main layers: the communication layer and the service layer. The communication layer is built on the SOAP layer and ensures the implementation of security and service protocols. The service layer provides the discovery of services and the authorization of client ap...
متن کاملOn the Secure Implementation of Security Protocols
We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the context of an API that provides standard cryptography and communication services. Given a dependency specification, stating how API methods can produce and consume secret information, we propose an information flow propert...
متن کاملSecurity analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols
In this paper we propose security analysis on passive attack for Nalla-Reddy’s ID-AK-2 and ID-AK-3 protocols. Keywors:Passive attack,Tripartite key agreement,Bilinear pairings
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer systems science and engineering
سال: 2023
ISSN: ['0267-6192']
DOI: https://doi.org/10.32604/csse.2023.029899