SECURE DEMAND RESPONSE SCHEME USING SESSION KEYS

Journal Title: Elysium Journal of Engineering Research and Management - Year 2015, Vol 2, Issue 4

Abstract

An Identity-based secure data retrieval scheme using Paillier cryptosystem for privacy-preserving applications. The proposed scheme is defined in the following accomplishment. Initially, immediate attribute revocation is used to enhance the secrecy of private data via reducing the windows of susceptibility. Then, fine-grained access policy described by encryptor’s using several monotone access structure underneath attributes delivered from several selected set of authorities. Finally, the characteristic of the privacy-preserving applications is exploited by an e s c r o w-free identity-based key issuing protocol and the key escrow problem could be solved. If, unauthorized users have not enough authorizations to satisfy the access policy should be restricted from accessing the plain data in the storage system. Moreover, unauthorized access from the storage system or key authorities should be prevented. In case, multiple users join together, they m i g h t decrypt a cipher text by combining their features and also if each of the users couldn’t decrypt the cipher text alone. Furthermore, an adaptive key evolution technique is scrutinized to make sure the users’ session keys to forward safe and secure. The EPPDR can achieve forward secrecy of users’ session keys, privacy-preservation of electricity demand, and evolution of users’ private keys is indicated by the security analysis. If compared to an existing scheme that also attains forward secrecy. But, EPPDR has improved efficiency in terms of communication overheads and computation. Then, it can adaptively control the key evolution by balance the trade-off between the security level and communication efficiency.

Authors and Affiliations

Deepika C. , Sheela A

Keywords

Related Articles

High Voltage-Boosting Converters Based on Soft-Switched Interleaved Boost Converters

This project objective is to generalize the scheme for new switching interleaved step-up converters that is fit for high power applications and high step-up. In this scheme, high voltage-boosting converters are proposed....

Elimination of Commutation Failure of VSC HVDC System with Controllable Capacitor

This system presents a totally unique hybrid converter configuration for traditional Line-Commutated converter (LCC) HVDC technology aiming to eliminate commutation failures at lower place serious faults. Dynamic series...

A Model for Trusted Cloud Computing with Remote Attestation

Enforcing an interactive pattern in any association will force it to behave in the predictable way thorough which it can be secured against any unauthorized access leading to a trusted atmosphere. Security declaration in...

A Survey on Several Techniques Used To Detect Selfish Node in MANET

Mobile Adhoc Network is a continuously self-configuring, infrastructure-less network of mobile devices connected without wires. Each device in a MANET is free to move independently in any direction, and will therefore ch...

RESOURCE PROCUREMENT MECHANISM SCHEME FOR CLOUD COMPUTING

The cloud resource the limitations auctions, dynamic pricing

Download PDF file
  • EP ID EP399986
  • DOI -
  • Views 97
  • Downloads 0

How To Cite

Deepika C. , Sheela A (2015). SECURE DEMAND RESPONSE SCHEME USING SESSION KEYS. Elysium Journal of Engineering Research and Management, 2(4), -. https://europub.co.uk/articles/-A-399986