2020
DOI: 10.1109/access.2020.2977264
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Authentication Scheme for Remote Data Access and Sharing Over Cloud Storage in Cyber-Physical-Social-Systems

Abstract: Cyber-physical-social systems (CPSSs) epitomize an evolving paradigm, including the social, physical, and cyber world. The vital goal of CPSSs is to offer personalized, high-quality, and proactive services for the end-users. An ingenious framework for reliable services is required for CPSSs to achieve this purpose. In this regard, the cloud storage environment of cloud computing (having a great connection with the physical, cyber, and social world) requires a reliable framework for secure communication between… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(10 citation statements)
references
References 32 publications
0
10
0
Order By: Relevance
“…It can be inferred that the smart card security schemes mentioned in Yeh et al [11], Wang et al [22], Truong et al [29], Ghaffar et al [47], and Ostad-Sharif et al [49] either fail to satisfy one or more security attributes listed in Table 5 or fail to resist one or more security attacks mentioned in Table 6. Only the schemes of Zhao et al [7], Chaudhary et al [27], Mo et al [55], and Xie et al [61], and the proposed ECSSP-SC, successfully satisfy each security attribute listed in Table 5 and can counter every attack enumerated in Table 6.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…It can be inferred that the smart card security schemes mentioned in Yeh et al [11], Wang et al [22], Truong et al [29], Ghaffar et al [47], and Ostad-Sharif et al [49] either fail to satisfy one or more security attributes listed in Table 5 or fail to resist one or more security attacks mentioned in Table 6. Only the schemes of Zhao et al [7], Chaudhary et al [27], Mo et al [55], and Xie et al [61], and the proposed ECSSP-SC, successfully satisfy each security attribute listed in Table 5 and can counter every attack enumerated in Table 6.…”
Section: Discussionmentioning
confidence: 99%
“…The smart card security schemes mentioned in the literature survey are based either on modular exponentiation or elliptic curves. The schemes of Yeh et al [11] and Wang et al [22] listed in Table 4, Table 5, and Table 6, are based on modular exponentiation, while the other schemes mentioned in [7,27,29,47,49,55,61] are based on elliptic curves, although they do not use signcryption. As mentioned in Table 3, the proposed ECSSP-SC has utilized the signcryption based on an elliptic curve to reduce the computational time and to decrease the communication overhead.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Other vulnerabilities in the power electrons applications are the usage of the smart meters, which have two-way communications that donate to various security concerns about the attacker's capabilities to avail the interaction. As the smart meter has a backdoor, it can make the attacker abuse to have full control over the device [130].…”
Section: B the Cp Vulnerabilities In The Power Electronics Applicationsmentioning
confidence: 99%
“…Since it was proposed, it has attracted extensive attention of many scholars. For example, aiming at the problem of trajectory data access and sharing over cloud environment, literature [9] proposed an improved authentication system scheme (CPSSs) that comprehensively considers cyber, physical, and social systems. Literature [10]- [14] successfully proposed a multi keyword ciphertext retrieval scheme suitable for cloud environment.…”
Section: Introductionmentioning
confidence: 99%