SECURE DEMAND RESPONSE SCHEME USING SESSION KEYS
Journal Title: Elysium Journal of Engineering Research and Management - Year 2015, Vol 2, Issue 4
Abstract
An Identity-based secure data retrieval scheme using Paillier cryptosystem for privacy-preserving applications. The proposed scheme is defined in the following accomplishment. Initially, immediate attribute revocation is used to enhance the secrecy of private data via reducing the windows of susceptibility. Then, fine-grained access policy described by encryptor’s using several monotone access structure underneath attributes delivered from several selected set of authorities. Finally, the characteristic of the privacy-preserving applications is exploited by an e s c r o w-free identity-based key issuing protocol and the key escrow problem could be solved. If, unauthorized users have not enough authorizations to satisfy the access policy should be restricted from accessing the plain data in the storage system. Moreover, unauthorized access from the storage system or key authorities should be prevented. In case, multiple users join together, they m i g h t decrypt a cipher text by combining their features and also if each of the users couldn’t decrypt the cipher text alone. Furthermore, an adaptive key evolution technique is scrutinized to make sure the users’ session keys to forward safe and secure. The EPPDR can achieve forward secrecy of users’ session keys, privacy-preservation of electricity demand, and evolution of users’ private keys is indicated by the security analysis. If compared to an existing scheme that also attains forward secrecy. But, EPPDR has improved efficiency in terms of communication overheads and computation. Then, it can adaptively control the key evolution by balance the trade-off between the security level and communication efficiency.
Authors and Affiliations
Deepika C. , Sheela A
DESIGN AND IMPLEMENTATION OF 32 BIT ALU USING LOOK AHEAD CLOCK GATING BASED ON FPGA
Any type of digital architecture is modified by using the VLSI technology. In digital systems, clock gating is the best method to reduce consumption of power. As power consumption plays an important role i...
High Voltage-Boosting Converters Based on Soft-Switched Interleaved Boost Converters
This project objective is to generalize the scheme for new switching interleaved step-up converters that is fit for high power applications and high step-up. In this scheme, high voltage-boosting converters are proposed....
A SURVEY ON ENERGY-AWARE RESOURCE ALLOCATION METHOD FOR SCIENTIFIC WORKFLOW EXECUTIONS IN CLOUD ENVIRONMENT
An Energy aware resource allocation method is used for allocating the consumption, energy and space. A Cloud platform is the central Storage area, and by Enlarging this can be achieved. Energy c...
QR Code Authentication Based Goods Delivery System
This application is for, order checking between delivery boy and the customer. If the customer order some goods in a particular company/ industry means, the order information such as customer name, address, amount, numbe...
A Model for Trusted Cloud Computing with Remote Attestation
Enforcing an interactive pattern in any association will force it to behave in the predictable way thorough which it can be secured against any unauthorized access leading to a trusted atmosphere. Security declaration in...