M. Ashouri-Talouki

[ 1 ] - An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

[ 2 ] - بررسی روش‌های حفاظت از حریم مکانی گروهی در خدمات مبتنی بر مکان و چالش‌های موجود

در خدمات میتنی بر مکان با توجه به موقعیت مکانی کاربران، خدمات ارائه می‌­شود. این خدمات می­تواند توسط یک فرد یا گروهی از افراد استفاده شود؛ در هر دو حالت لازم است، مکان افراد برای فراهم‌­کنندۀ خدمات آشکار شود، بنابراین به‌­منظور تأمین امنیت کاربران، لازم است حریم مکانی آنها حفظ شود. از این رو راه‌کارهایی برای حفظ حریم مکانی افراد در هنگام استفاده از خدمات مبتنی بر مکان ارائه شده‌­اند. در این مقا...

[ 3 ] - پروتکل کارا برای جمع چندسویه امن با قابلیت تکرار

In secure multiparty computation (SMC), a group of users jointly and securely computes a mathematical function on their private inputs, such that the privacy of their private inputs will be preserved. One of the widely used applications of SMC is the secure multiparty summation which securely computes the summation value of the users’ private inputs. In this paper, we consider a secure multipar...

[ 4 ] - DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

[ 5 ] - Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...