Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (50)
  • Open Access

    ARTICLE

    Authorized Attribute-Based Encryption Multi-Keywords Search with Policy Updating

    Muqadar Ali, Chungen Xu*, Abid Hussain

    Journal of New Media, Vol.2, No.1, pp. 31-43, 2020, DOI:10.32604/jnm.2020.09946 - 14 August 2020

    Abstract Attribute-based encryption is cryptographic techniques that provide flexible data access control to encrypted data content in cloud storage. Each trusted authority needs proper management and distribution of secret keys to the user’s to only authorized user’s attributes. However existing schemes cannot be applied multiple authority that supports only a single keywords search compare to multi keywords search high computational burden or inefficient attribute’s revocation. In this paper, a ciphertext policy attribute-based encryption (CP-ABE) scheme has been proposed which focuses on multi-keyword search and attribute revocation by new policy updating feathers under multiple authorities and central More >

  • Open Access

    ARTICLE

    A LoRaWAN Access Technology Based on Channel Adaptive Adjustment

    Li Ma, Meng Zhao*, Dongchao Ma, Yingxun Fu

    Journal of New Media, Vol.2, No.1, pp. 11-20, 2020, DOI:10.32604/jnm.2020.09715 - 14 August 2020

    Abstract Low-power wide area network (LPWAN) has developed rapidly in recent years and is widely used in various Internet of Things (IoT) services. In order to reduce cost and power consumption, wide coverage, LPWAN tends to use simple channel access control protocols, such as the Aloha protocol. This protocol is simple with poor extension capability. In high-density environment, Aloha protocol will lead to low channel utilization, prolonged access and high conflict probability. Therefore, in order to solve the above problems, we propose an enhanced channel access control mechanism based on the existing LoRaWAN protocol, that is, More >

  • Open Access

    ARTICLE

    A Distributed Privacy Preservation Approach for Big Data in Public Health Emergencies Using Smart Contract and SGX

    Jun Li1, 2, Jieren Cheng2, *, Naixue Xiong3, Lougao Zhan4, Yuan Zhang1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 723-741, 2020, DOI:10.32604/cmc.2020.011272 - 23 July 2020

    Abstract Security and privacy issues have become a rapidly growing problem with the fast development of big data in public health. However, big data faces many ongoing serious challenges in the process of collection, storage, and use. Among them, data security and privacy problems have attracted extensive interest. In an effort to overcome this challenge, this article aims to present a distributed privacy preservation approach based on smart contracts and Intel Software Guard Extensions (SGX). First of all, we define SGX as a trusted edge computing node, design data access module, data protection module, and data… More >

  • Open Access

    ARTICLE

    Searchable Encryption with Access Control on Keywords in Multi-User Setting

    Lei Li1, Chungen Xu1, *, Xiaoling Yu1, Bennian Dou1, Cong Zuo2

    Journal of Cyber Security, Vol.2, No.1, pp. 9-23, 2020, DOI:10.32604/jcs.2020.06313

    Abstract Searchable encryption technology makes it convenient to search encrypted data with keywords for people. A data owner shared his data with other users on the cloud server. For security, it is necessary for him to build a fine-grained and flexible access control mechanism. The main idea of this paper is to let the owner classify his data and then authorizes others according to categories. The cloud server maintains a permission matrix, which will be used to verify whether a trapdoor is valid or not. In this way we can achieve access control and narrow the More >

  • Open Access

    ARTICLE

    A Multi-Tenant Usage Access Model for Cloud Computing

    Zhengtao Liu1, *, Yun Yang1, Wen Gu1, Jinyue Xia2

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1233-1245, 2020, DOI:10.32604/cmc.2020.010846 - 10 June 2020

    Abstract Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures. It offers tremendous advantages for enterprises and service providers. It is anticipated that this situation will evolve to foster cross-tenant collaboration supported by Authorization as a service. To realize access control in a multi-tenant cloud computing environment, this study proposes a multi-tenant cloud computing access control model based on the traditional usage access control model by building trust relations among tenants. The model consists of three submodels, which achieve trust relationships between tenants with different granularities and satisfy the More >

  • Open Access

    ARTICLE

    A Temporal Multi-Tenant RBAC Model for Collaborative Cloud Services

    Zhengtao Liu1, *, Yi Ying1, Yaqin Peng1, Jinyue Xia2

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 861-871, 2020, DOI:10.32604/cmc.2020.07142 - 01 May 2020

    Abstract Multi-tenant collaboration brings the challenge to access control in cloud computing environment. Based on the multi-tenant role-based access control (MTRBAC) model, a Temporal MT-RBAC (TMT-RBAC) model for collaborative cloud services is proposed. It adds the time constraint between trusted tenants, including usable role time constraint based on both calendar and interval time. Analysis shows that the new model strengthens the presentation ability of MT-RBAC model, achieves the finergrained access control, reduces the management costs and enhances the security of multitenant collaboration in cloud computing environment. More >

  • Open Access

    ARTICLE

    Access Control Policy Based on Friend Circle

    Qin Liu1, Tinghuai Ma1, 2, *, Fan Xing1, Yuan Tian3, Abdullah Al-Dhelaan3, Mohammed Al-Dhelaan3

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1143-1159, 2020, DOI:10.32604/cmc.2020.04949

    Abstract Nowadays, the scale of the user’s personal social network (personal network, a network of the user and their friends, where the user we call “center user”) is becoming larger and more complex. It is difficult to find a suitable way to manage them automatically. In order to solve this problem, we propose an access control model for social network to protect the privacy of the central users, which achieves the access control accurately and automatically. Based on the hybrid friend circle detection algorithm, we consider the aspects of direct judgment, indirect trust judgment and malicious More >

  • Open Access

    ARTICLE

    Review of Access Control Model

    Zhengtao Liu1,*, Wen Gu1, Jinyue Xia2

    Journal of Cyber Security, Vol.1, No.1, pp. 43-50, 2019, DOI:10.32604/jcs.2019.06070

    Abstract Access control is one of the core problems in data management system. In this paper, the system requirements were described in three aspects: the traditional access control model, the access control model in the Internet era and the access control model in the cloud computing environment. Meanwhile, the corresponding major models were listed and their characteristics and problems were analyzed. Finally, the development trend of the corresponding model was proposed. More >

  • Open Access

    ARTICLE

    Security and Privacy Frameworks for Access Control Big Data Systems

    Paolina Centonze1,*

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 361-374, 2019, DOI:10.32604/cmc.2019.06223

    Abstract In the security and privacy fields, Access Control (AC) systems are viewed as the fundamental aspects of networking security mechanisms. Enforcing AC becomes even more challenging when researchers and data analysts have to analyze complex and distributed Big Data (BD) processing cluster frameworks, which are adopted to manage yottabyte of unstructured sensitive data. For instance, Big Data systems’ privacy and security restrictions are most likely to failure due to the malformed AC policy configurations. Furthermore, BD systems were initially developed toped to take care of some of the DB issues to address BD challenges and… More >

  • Open Access

    ARTICLE

    Inverted XML Access Control Model Based on Ontology Semantic Dependency

    Meijuan Wang1,2,*, Jian Wang1, Lihong Guo1,3, Lein Harn4

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 465-482, 2018, DOI:10.3970/cmc.2018.02568

    Abstract In the era of big data, the conflict between data mining and data privacy protection is increasing day by day. Traditional information security focuses on protecting the security of attribute values without semantic association. The data privacy of big data is mainly reflected in the effective use of data without exposing the user’s sensitive information. Considering the semantic association, reasonable security access for privacy protect is required. Semi-structured and self-descriptive XML (eXtensible Markup Language) has become a common form of data organization for database management in big data environments. Based on the semantic integration nature More >

Displaying 41-50 on page 5 of 50. Per Page