SECURE DEMAND RESPONSE SCHEME USING SESSION KEYS
Journal Title: Elysium Journal of Engineering Research and Management - Year 2015, Vol 2, Issue 4
Abstract
An Identity-based secure data retrieval scheme using Paillier cryptosystem for privacy-preserving applications. The proposed scheme is defined in the following accomplishment. Initially, immediate attribute revocation is used to enhance the secrecy of private data via reducing the windows of susceptibility. Then, fine-grained access policy described by encryptor’s using several monotone access structure underneath attributes delivered from several selected set of authorities. Finally, the characteristic of the privacy-preserving applications is exploited by an e s c r o w-free identity-based key issuing protocol and the key escrow problem could be solved. If, unauthorized users have not enough authorizations to satisfy the access policy should be restricted from accessing the plain data in the storage system. Moreover, unauthorized access from the storage system or key authorities should be prevented. In case, multiple users join together, they m i g h t decrypt a cipher text by combining their features and also if each of the users couldn’t decrypt the cipher text alone. Furthermore, an adaptive key evolution technique is scrutinized to make sure the users’ session keys to forward safe and secure. The EPPDR can achieve forward secrecy of users’ session keys, privacy-preservation of electricity demand, and evolution of users’ private keys is indicated by the security analysis. If compared to an existing scheme that also attains forward secrecy. But, EPPDR has improved efficiency in terms of communication overheads and computation. Then, it can adaptively control the key evolution by balance the trade-off between the security level and communication efficiency.
Authors and Affiliations
Deepika C. , Sheela A
PRIVACY PROTECTION FOR SECURE DATA ENCRYPTION IN ONLINE SOCIAL NETWORKS
Network security is an act of protecting the information from unauthorized access; it controls and monitors the security of the whole network. The threats to network security are alarmingly increasing day by...
A HYBRID ABC-PSO FOR SOLVING OPTIMAL POWER FLOW PROBLEM
This paper presented an application for hybrid technique for solving optimal power flow problem that occur in power system. The proposed hybrid technique is the combination of artificial bee colony algorithm and particle...
Amalgamation of Forecasting Environment Based upon Natural Disaster (Earth Quake) Analysis using DM Techniques
Streams of data is collected from big data and gathered information is separated from these data is known as data mining. This tools forecasts performances and future developments, permitting trades to provide useful dec...
PANORAMIC IMAGE STITCHING USING A PROBABILISTIC COLOUR CORRECTION APPROACH
Image mosaicing in image processing is a technique in which two or more partially overlapping images of the same scene taken at different times and from different positions are combined together to get a more clearer vie...
LOW LOSS AND WIDE BAND TRAPEZOID BASED MONO- POLE UWB ANTENNA DESIGN
Currently highly directive antennas on the market can be choice from as tiny as fifty greenbacks to hundreds of dollars. The gained of these antennas, ranges between since 8dBi into 20dBi. A...