SECURE DEMAND RESPONSE SCHEME USING SESSION KEYS
Journal Title: Elysium Journal of Engineering Research and Management - Year 2015, Vol 2, Issue 4
Abstract
An Identity-based secure data retrieval scheme using Paillier cryptosystem for privacy-preserving applications. The proposed scheme is defined in the following accomplishment. Initially, immediate attribute revocation is used to enhance the secrecy of private data via reducing the windows of susceptibility. Then, fine-grained access policy described by encryptor’s using several monotone access structure underneath attributes delivered from several selected set of authorities. Finally, the characteristic of the privacy-preserving applications is exploited by an e s c r o w-free identity-based key issuing protocol and the key escrow problem could be solved. If, unauthorized users have not enough authorizations to satisfy the access policy should be restricted from accessing the plain data in the storage system. Moreover, unauthorized access from the storage system or key authorities should be prevented. In case, multiple users join together, they m i g h t decrypt a cipher text by combining their features and also if each of the users couldn’t decrypt the cipher text alone. Furthermore, an adaptive key evolution technique is scrutinized to make sure the users’ session keys to forward safe and secure. The EPPDR can achieve forward secrecy of users’ session keys, privacy-preservation of electricity demand, and evolution of users’ private keys is indicated by the security analysis. If compared to an existing scheme that also attains forward secrecy. But, EPPDR has improved efficiency in terms of communication overheads and computation. Then, it can adaptively control the key evolution by balance the trade-off between the security level and communication efficiency.
Authors and Affiliations
Deepika C. , Sheela A
Monitoring Aggression In Adolescents: Chandra Namaskara As A Panacea
Aggression in adolescence is a key point of focus for psychologists, educationists, parents, and teachers. On the other hand, interdisciplinary researches with special reference to yoga and psychology are growing rapidly...
A Modified Blowfish Algorithm for Improving the Cloud Security
The accessing of sensitive information from the cloud database is done through the internet. To avoid the hacking number of privacy preservation mechanisms such as cryptography, attribute-based models are employed. The e...
Monitoring of Diabetes in Children Based on the Internet of Things
This paper presents an eHealth platform to support an emerging multidimensional care approach for the treatment of diabetes. This approach works by means of remote collection and monitoring of patient data and provision...
HADOOP MAP REDUCE ENHANCEMENT THROUGH IMPROVED AUGMENTED ALGORITHM
The MapReduce model is implemented by using open-source software of Hadoop. A number of issues faced by Hadoop to achieve the best performance. A serialization barrier requires to achieve the best performance whi...
USER INTEREST FOR PERSONALISED SEARCH BASED ON AUTOMATIC IDENTIFICATION
The quality of several search services on the Internet is enhanced by the personalized web search (PWS). Due to the user’s unwillingness to reveal their individual information, while search has become...