• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种基于新型区块链和双线性多项式的复杂云数据隐私和安全 QCP-ABE 框架。

A Novel Blockchain and Bi-Linear Polynomial-Based QCP-ABE Framework for Privacy and Security over the Complex Cloud Data.

机构信息

Department of Computer Science and Engineering, GITAM Institute of Technology, GITAM Deemed to be University, Visakhapatnam 530045, India.

Department of Artificial Intelligence & Data Science, Annamacharya Institute of Technology and Sciences, Rajampet 516115, India.

出版信息

Sensors (Basel). 2021 Nov 2;21(21):7300. doi: 10.3390/s21217300.

DOI:10.3390/s21217300
PMID:34770606
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8588405/
Abstract

As a result of the limited resources available in IoT local devices, the large scale cloud consumer's data that are produced by IoT related machines are contracted out to the cloud. Cloud computing is unreliable, using it can compromise user privacy, and data may be leaked. Because cloud-data and grid infrastructure are both growing exponentially, there is an urgent need to explore computational sources and cloud large-data protection. Numerous cloud service categories are assimilated into numerous fields, such as defense systems and pharmaceutical databases, to compute information space and allocation of resources. Attribute Based Encryption (ABE) is a sophisticated approach which can permit employees to specify a higher level of security for data stored in cloud storage facilities. Numerous obsolete ABE techniques are practical when applied to small data sets to generate cryptograms with restricted computational properties; their properties are used to generate the key, encrypt it, and decrypt it. To address the current concerns, a dynamic non-linear polynomial chaotic quantum hash technique on top of secure block chain model can be used for enhancing cloud data security while maintaining user privacy. In the proposed method, customer attributes are guaranteed by using a dynamic non- polynomial chaotic map function for the key initialization, encryption, and decryption. In the proposed model, both organized and unorganized massive clinical data are considered to be inputs for reliable corroboration and encoding. Compared to existing models, the real-time simulation results demonstrate that the stated standard is more precise than 90% in terms of bit change and more precise than 95% in terms of dynamic key generation, encipherment, and decipherment time.

摘要

由于物联网本地设备资源有限,物联网相关机器产生的大规模云消费者数据被外包到云端。云计算不可靠,使用它会损害用户隐私,并且数据可能会被泄露。由于云数据和网格基础设施都在呈指数级增长,因此迫切需要探索计算资源和云大数据保护。许多云服务类别被整合到许多领域,如防御系统和制药数据库,以计算信息空间和资源分配。基于属性的加密(ABE)是一种复杂的方法,可以允许员工为存储在云存储设施中的数据指定更高的安全级别。当应用于小数据集时,许多过时的 ABE 技术在生成具有受限计算属性的密文方面非常实用;它们的属性用于生成密钥、加密和解密。为了解决当前的问题,可以在安全区块链模型之上使用动态非线性多项式混沌量子散列技术来提高云数据安全性,同时保护用户隐私。在提出的方法中,使用动态非多项式混沌映射函数对密钥初始化、加密和解密进行客户属性保证。在提出的模型中,组织和非组织的大量临床数据都被视为可靠验证和编码的输入。与现有模型相比,实时仿真结果表明,该标准在比特变化方面的准确率超过 90%,在动态密钥生成、加密和解密时间方面的准确率超过 95%。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/c4c86f93269d/sensors-21-07300-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/30c71a4c3c8b/sensors-21-07300-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/514e1a42855d/sensors-21-07300-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/a46ac01141a8/sensors-21-07300-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/5a558a0de069/sensors-21-07300-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/ea3a4c19c509/sensors-21-07300-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/2ef7265624dc/sensors-21-07300-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/92fc9d3ee476/sensors-21-07300-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/c0aa1745f2b8/sensors-21-07300-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/f1f70e9d1170/sensors-21-07300-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/736166c12abf/sensors-21-07300-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/c4c86f93269d/sensors-21-07300-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/30c71a4c3c8b/sensors-21-07300-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/514e1a42855d/sensors-21-07300-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/a46ac01141a8/sensors-21-07300-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/5a558a0de069/sensors-21-07300-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/ea3a4c19c509/sensors-21-07300-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/2ef7265624dc/sensors-21-07300-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/92fc9d3ee476/sensors-21-07300-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/c0aa1745f2b8/sensors-21-07300-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/f1f70e9d1170/sensors-21-07300-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/736166c12abf/sensors-21-07300-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1744/8588405/c4c86f93269d/sensors-21-07300-g011.jpg

相似文献

1
A Novel Blockchain and Bi-Linear Polynomial-Based QCP-ABE Framework for Privacy and Security over the Complex Cloud Data.一种基于新型区块链和双线性多项式的复杂云数据隐私和安全 QCP-ABE 框架。
Sensors (Basel). 2021 Nov 2;21(21):7300. doi: 10.3390/s21217300.
2
A robust algorithm for authenticated health data access via blockchain and cloud computing.一种通过区块链和云计算进行认证的健康数据访问的稳健算法。
PLoS One. 2024 Sep 23;19(9):e0307039. doi: 10.1371/journal.pone.0307039. eCollection 2024.
3
Secure Collaborative Platform for Health Care Research in an Open Environment: Perspective on Accountability in Access Control.安全的开放环境下医疗保健研究协作平台:访问控制中的问责制视角。
J Med Internet Res. 2022 Oct 14;24(10):e37978. doi: 10.2196/37978.
4
A privacy-preserving blockchain-based tracing model for virus-infected people in cloud.一种基于区块链的云环境中病毒感染者隐私保护追踪模型。
Expert Syst Appl. 2023 Jan;211:118545. doi: 10.1016/j.eswa.2022.118545. Epub 2022 Aug 18.
5
A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain.基于区块链的物联网环境中的安全代理数据共享模块。
Sensors (Basel). 2019 Mar 11;19(5):1235. doi: 10.3390/s19051235.
6
Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage.基于区块链的去中心化存储中安全共享个人健康记录的访问控制方案。
Sensors (Basel). 2021 Apr 2;21(7):2462. doi: 10.3390/s21072462.
7
A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment.基于错误的环学习密文策略属性基代理重加密方案,用于云环境中的安全大数据共享。
Big Data. 2024 Oct;12(5):357-366. doi: 10.1089/big.2021.0301. Epub 2022 Apr 11.
8
Blockchain-Based Data Access Control and Key Agreement System in IoT Environment.基于区块链的物联网环境中的数据访问控制和密钥协商系统。
Sensors (Basel). 2023 May 29;23(11):5173. doi: 10.3390/s23115173.
9
Perceived Security Risk Based on Moderating Factors for Blockchain Technology Applications in Cloud Storage to Achieve Secure Healthcare Systems.基于区块链技术在云存储中应用的调节因素感知安全风险,以实现安全的医疗保健系统。
Comput Math Methods Med. 2022 Jan 19;2022:6112815. doi: 10.1155/2022/6112815. eCollection 2022.
10
Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey.基于属性的加密方案在下一代无线物联网网络中的应用:全面调查。
Sensors (Basel). 2023 Jun 26;23(13):5921. doi: 10.3390/s23135921.

引用本文的文献

1
A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks.一种增强 IIoT 隐私和计算能力的新型 QKD 方法。
Sensors (Basel). 2022 Sep 6;22(18):6741. doi: 10.3390/s22186741.

本文引用的文献

1
A hybrid network intrusion detection using darwinian particle swarm optimization and stacked autoencoder hoeffding tree.基于达尔文粒子群优化和堆叠自动编码器赫夫丁树的混合网络入侵检测
Math Biosci Eng. 2021 Sep 15;18(6):8024-8044. doi: 10.3934/mbe.2021398.
2
IBE-Lite: a lightweight identity-based cryptography for body sensor networks.IBE-Lite:一种用于身体传感器网络的轻量级基于身份的密码学。
IEEE Trans Inf Technol Biomed. 2009 Nov;13(6):926-32. doi: 10.1109/TITB.2009.2033055. Epub 2009 Sep 29.