Fig 3 - uploaded by Hitesh Tewari
Content may be subject to copyright.
Source publication
In the era of social media and messaging applications, people are becoming increasingly aware of data privacy issues associated with such apps. Major messaging applications are moving towards end-to-end encryption (E2EE) to give their users the privacy they are demanding. However the current security mechanisms employed by different service provide...
Context in source publication
Context 1
... to generate their backup decryption key using a known secret (e.g. a password). The backup data is stored on the user's Google Drive/iCloud/OneDrive etc. and encrypted by the backup key. When the user changes their device, they can download their backups from the cloud drive and decrypt them using their backup key generated from a known secret. Fig. 3 depicts the sequence diagram for the backup and restoration phases. Since the backup key is generated using the known secret, the user can re-generate it using the same process with the same known secret. If the user loses his/her backup key and also forgets the known secret there is no way to recreate the ...
Similar publications
Cyberphysical systems connect physical devices and large private network environments in modern communication systems. A fundamental worry in the establishment of large private networks is mitigating the danger of transactional data privacy breaches caused by adversaries using a variety of exploitation techniques. This study presents a privacy-pres...
Almost all existing data integrity verification schemes upload outsourced files and tags set to the CSP simultaneously. Thus, in this paper, we provide a novel idea to construct the integrity verification scheme via blockchain. The construction of the proposed scheme is based on identity-based encryption (IBE) which avoids the complex certificate m...
In the context of cloud computing, the interaction between clients in different application domains becomes more frequent, which makes cross‐domain identity authentication safely and efficiently become an important research topic. Public key infrastructure (PKI) is a technology to solve cross‐domain authentication. However, there are problems such...
Cloud computing has emerged as a highly efficient platform that allows multiple users to access various services through virtualization on a shared physical network. The participants in a Cloud Computing (CC) environment include Cloud Service Providers (CSP), Consumers, Brokers, and Auditors. The advantages of cloud storage, such as universal netwo...
The Internet of Medical Things (IoMT) has revolutionized healthcare by bringing real-time monitoring and data-driven treatments. Nevertheless, the security of communication between IoMT devices and servers remains a huge problem because of the inherent sensitivity of the health data and susceptibility to cyber threats. Current security solutions, i...