• Title/Summary/Keyword: Efficient Identity Management

Search Result 62, Processing Time 0.018 seconds

New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups

  • Lee, Kwang-Su;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.968-988
    • /
    • 2010
  • Anonymous hierarchical identity based encryption (HIBE) is an extension of identity based encryption (IBE) that can use an arbitrary string like an e-mail address for a public key, and it additionally provide the anonymity of identity in ciphertexts. Using the anonymous HIBE schemes, it is possible to construct anonymous communication systems and public key encryption with keyword search. This paper presents an anonymous HIBE scheme with constant size ciphertexts under prime order symmetric bilinear groups, and shows that it is secure under the selective security model. Previous anonymous HIBE schemes were constructed to have linear size ciphertexts, to use composite order bilinear groups, or to use asymmetric bilinear groups that is a special type of bilinear groups. Our construction is the first efficient anonymous HIBE scheme that has constant size ciphertexts and that uses prime order symmetric bilinear groups. Compared to the previous scheme of composite order bilinear groups, ours is ten times faster. To achieve our construction, we first devise a novel cancelable random blinding technique. The random blinding property of our technique provides the anonymity of our construction, and the cancellation property of our technique enables decryption.

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1043-1063
    • /
    • 2019
  • With delegating proxy to process data before outsourcing, data owners in restricted access could enjoy flexible and powerful cloud storage service for productivity, but still confront with data integrity breach. Identity-based data auditing as a critical technology, could address this security concern efficiently and eliminate complicated owners' public key certificates management issue. Recently, Yu et al. proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019). It aims to offer identity-based, privacy-preserving and batch auditing for multiple owners' data on different clouds, while allowing proxy processing. In this article, we first demonstrate this scheme is insecure in the sense that malicious cloud could pass integrity auditing without original data. Additionally, clouds and owners are able to recover proxy's private key and thus impersonate it to forge tags for any data. Secondly, we propose an improved scheme with provable security in the random oracle model, to achieve desirable secure identity based privacy-preserving batch public auditing with proxy processing. Thirdly, based on theoretical analysis and performance simulation, our scheme shows better efficiency over existing identity-based auditing scheme with proxy processing on single owner and single cloud effort, which will benefit secure big data storage if extrapolating in real application.

Priority for the Integrated Management of Infrastructure in Wirye New Town (위례신도시 기반시설 통합관리 우선순위에 관한 연구)

  • Choi, Sang-Hee;Kim, Ryoon-Hee;Kim, Doo-Hwan
    • Land and Housing Review
    • /
    • v.8 no.3
    • /
    • pp.113-121
    • /
    • 2017
  • Wirye New Town is constructed as a new complex city with three municipalities. Infrastructure must be managed by administrative districts, but integrated management is also needed when considering the planned identity and efficient management and operation aspects of a new town. The purpose of this study is to establish why the integrated management of infrastructure is needed, to form a consensus of stakeholders and to set priorities of integrated management considering characteristics of each facility. This thesis analyzes the order of priorities for integrated management of the infrastructures in Wirye New Town. The study includes an analytic hierarchy process (AHP) survey that asked 95 local city officials and experts in city planning about important values to consider, such as efficiency, equity, and identity, for the integrated management of infrastructures in Wirye New Town. Another survey requested these same people to identify the priorities for integrated management in terms of different infrastructure types. The results are as follows. Those who were surveyed considered efficiency(0.442) to be the most important value for integrated management. Equity was deemed to be the next most important(0.369), followed by identity(0.190). The second step in the AHP survey revealed that "efficiency of management governance" (0.202) was considered to be the most important, then "equity of infrastructure quality among the sub-regions" (0.155), and finally "efficiency for improvement of quality and quantity of services" (0.133). The results of the survey about the priority for integrated management among infrastructure types and AHP shows that 'specialized facilities', 'Space facilities located in more than two municipalities', and 'linear facilities located in more than two municipalities.' are important.

Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage

  • Zhang, Yinghui;Zhang, Tiantian;Guo, Rui;Xu, Shengmin;Zheng, Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5653-5672
    • /
    • 2019
  • In cloud computing era, an increasing number of resource-constrained users outsource their data to cloud servers. Due to the untrustworthiness of cloud servers, it is important to ensure the integrity of outsourced data. However, most of existing solutions still have challenging issues needing to be addressed, such as the identity privacy protection of users, the traceability of users, the supporting of dynamic user operations, and the publicity of auditing. In order to tackle these issues simultaneously, in this paper, we propose a traceable dynamic public auditing scheme with identity privacy preserving for cloud storage. In the proposed scheme, a single user, including a group manager, is unable to know the signer's identity. Furthermore, our scheme realizes traceability based on a secret sharing mechanism and supports dynamic user operations. Based on the security and efficiency analysis, it is shown that our scheme is secure and efficient.

Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy

  • Yu, Haiyang;Cai, Yongquan;Kong, Shanshan;Ning, Zhenhu;Xue, Fei;Zhong, Han
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5039-5061
    • /
    • 2017
  • Cloud storage becomes a new trend that more and more users move their data to cloud storage servers (CSSs). To ensure the security of cloud storage, many cloud auditing schemes are proposed to check the integrity of users' cloud data. However, most of them are based on public key infrastructure, which leads to complex certificates management and verification. Besides, most existing auditing schemes are inefficient when user uploads a large amount of data or a third party auditor (TPA) performs auditing for multiple users' data on different CSSs. To overcome these problems, in this paper, we propose an efficient and secure auditing scheme based on identity-based cryptography. To relieve user's computation burden, we introduce a proxy, which is delegated to generate and upload homomorphic verifiable tags for user. We extend our auditing scheme to support auditing for dynamic data operations. We further extend it to support batch auditing in multiple users and multiple CSSs setting, which is practical and efficient in large scale cloud storage system. Extensive security analysis shows that our scheme is provably secure in random oracle model. Performance analysis demonstrates that our scheme is highly efficient, especially reducing the computation cost of proxy and TPA.

An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity

  • Li, Chun-Ta;Lee, Cheng-Chi;Weng, Chi-Yao;Fan, Chun-I
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.119-131
    • /
    • 2013
  • With the explosive growth of computer networks, many remote service providing servers and multi-server network architecture are provided and it is extremely inconvenient for users to remember numerous different identities and passwords. Therefore, it is important to provide a mechanism for a remote user to use single identity and password to access multi-server network architecture without repetitive registration and various multi-server authentication schemes have been proposed in recent years. Recently, Tsaur et al. proposed an efficient and secure smart card based user authentication and key agreement scheme for multi-server environments. They claimed that their scheme satisfies all of the requirements needed for achieving secure password authentication in multi-server environments and gives the formal proof on the execution of the proposed authenticated key agreement scheme. However, we find that Tsaur et al.'s scheme is still vulnerable to impersonation attack and many logged-in users' attack. We propose an extended scheme that not only removes the aforementioned weaknesses on their scheme but also achieves user anonymity for hiding login user's real identity. Compared with other previous related schemes, our proposed scheme keeps the efficiency and security and is more suitable for the practical applications.

The Diffusion and Use of RFID Technology in India

  • Bhatt, Nityesh;Cho, Namjae
    • Asia-Pacific Journal of Business
    • /
    • v.2 no.2
    • /
    • pp.36-60
    • /
    • 2011
  • Radio frequency identification(RFID) is a system of technology that transmits digitally coded identity information in the form of a unique serial number of an object or person wirelessly, using radio waves. The primary use of RFID has been in asset tracking. This makes it highly useful across various industries for effective and efficient conduct of different business processes like supply chain management (SCM). As the use of RFID expands, the use of this technology is observed in such industries as transportation, traffic payment, hospital and medical care, education, and retail. Although this technology offers immense potential, it faces multifarious roadblocks, particularly in developing countries like India. Under this backdrop, this paper attempts to present an overview of the use and application RFID technology in India with a highlight on business-ecosystem for RFID in India. We also present various technical and non-technical challenges in the implementation of RFID in India.

  • PDF

The Structure of Green Environmental Management Initiated by Greenspace Scotland

  • Takeshi Kinoshita;Ye Kyung-Rock
    • Journal of the Korean Institute of Landscape Architecture International Edition
    • /
    • no.2
    • /
    • pp.210-215
    • /
    • 2004
  • This study was conducted to report background, organism and activities of Greenspace Scotland, which was established for creation and management of green environment in urban Scotland, UK, and to help discussing an efficient structure for green environmental management in future Japan. As a result, it was confirmed that Greenspace Scotland plays a key role to develop and offer the framework - structure of partnership - for creating, regenerating and managing green environment from a large-scale point of view. Rich varieties of projects, which are difficult to manage by individual organization, have been brought to realization through circulating national funds and policies among local communities in partnership with existing charities and voluntary sector keeping their identity and independence. Greenspace Scotland also put stress on the aspects of social, cultural and economic regeneration in urban communities, and emphasizes a partnership development for above purposes.

  • PDF

Cross-Model Effect of Model Types, Product Gender Identity and Message Appeal Type (모델유형과 제품의 성 정체성 그리고 메시지 소구에 따른 크로스 광고모델 효과)

  • Kim, Eun-Hee;Yu, Seung Yeob
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.105-114
    • /
    • 2014
  • This study has recently been issued to businesses and consumers who examined the effects of cross-advertising model. Experimental design, the model type (2) ${\times}$ sexuality products (2) ${\times}$ advertising message appeal form (2) is a factorial design. The results are as follows. First, the advertising model, based on the type of cognitive response to advertising than the general model of cross-recall index was higher model. Second, the product of gender identity in response to what the advertising product for women than men was higher index of product recalls. Third, the ad attention model ANOVA results for each type of message, the main effect of appeal type was identified. In addition, the type and model of sexual identity, and message appeal type in the type of model interaction effects were found. Finally, the model-product analysis of goodness of fit, the model type and sexual identity and appeal type messages of main effect were identified. The result is more efficient advertising effect model strategies for promoting meaningful results, it is meant to be confirmed.

A study on DDoS Attack, Detecting and Defence in ubiquitous system (유비쿼터스환경에서의 DDoS의 공격과 탐지, 방어시스템에 관한 연구)

  • Jung, Chang-Duk;Cha, Joo-Won;Hwang, Sun-Il
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.544-548
    • /
    • 2009
  • The underlying success of logistics depends on the flow of data and information for effective management. Over the last 30 years, we have seen the power of microprocessors double about every 18months. This continuing trend means that computers will become considerably smaller, cheaper, and more abundant; indeed, they are becoming ubiquitous and are even finding their way into everyday objects, resulting in the creation of smart things. In the long term, ubiquitous technologies will take on great economic significance. Industrial products will become smart because of their integrated information processing capacity, or take on an electronic identity that can be queried remotely, or be equipped with sensors for detecting their environment, enabling the development of innovative products and totally new services. The global marketplace runs on logistics, security, speed, agility and flexibility..In this paper we report that pairing these traditional logistics functions with RFID technology can be a huge value-driver for companies. This winning combination yields increased logistics management effectiveness and more efficient visibility into the supply chain management.

  • PDF