Implementation of ID-based Audit Protocols to Enhance Security and Productivity

نویسندگان

چکیده

Cloud storage has gained increasing popularity, as it helps cloud users arbitrarily store and access the related outsourced data. Numerous public audit buildings have been presented to ensure data transparency. However, modern developments mostly constructed on key infrastructure. To achieve integrity, auditor must first authenticate legality of certificate, which adds an immense workload for auditor, in order that integrity is accomplished. The facilities anticipate quality should be regularly tracked minimize disruption saved maintain intactness stored remote server. One main problems individuals, though, how detect a term where people backup local files. Meanwhile, system often unlikely source-limited person perform inspection if overall file retrieved. In this work, stable effective ID-based auditing setting uses machine learning techniques proposed improve productivity enhance protection protocols. study tackles issue confidentiality reliability framework focused identity. idea already proved safe; its safety very relevant traditional presumption Computational Diffie–Hellman security assumption.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and Implementation of an Algorithm to Enhance Cloud Security

Cloud computing concept has been envisioned as architecture of the next generation for Information Technology (IT) enterprise. The Cloud computing idea offers with dynamic scalable resources provisioned as examine on the Internet. It allows access to remote computing services and users only have to pay for what they want to use, when they want to use it. But the security of the information whic...

متن کامل

Generalization of the Selective-ID Security Model for HIBE Protocols

We generalize the selective-ID security model for HIBE by introducing two new security models. Broadly speaking, both these models allow the adversary to commit to a set of identities and in the challenge phase choose any one of the previously committed identities. Two constructions of HIBE are presented which are secure in the two models. Further, we show that the HIBEs can be modified to obta...

متن کامل

Middleware for Automated Implementation of Security Protocols

We propose a middleware for automated implementation of security protocols for Web services. The proposed middleware consists of two main layers: the communication layer and the service layer. The communication layer is built on the SOAP layer and ensures the implementation of security and service protocols. The service layer provides the discovery of services and the authorization of client ap...

متن کامل

On the Secure Implementation of Security Protocols

We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the context of an API that provides standard cryptography and communication services. Given a dependency specification, stating how API methods can produce and consume secret information, we propose an information flow propert...

متن کامل

Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols

In this paper we propose security analysis on passive attack for Nalla-Reddy’s ID-AK-2 and ID-AK-3 protocols. Keywors:Passive attack,Tripartite key agreement,Bilinear pairings

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer systems science and engineering

سال: 2023

ISSN: ['0267-6192']

DOI: https://doi.org/10.32604/csse.2023.029899