2023
DOI: 10.3390/iot4030020
|View full text |Cite
|
Sign up to set email alerts
|

IoT-Applicable Generalized Frameproof Combinatorial Designs

Bimal Kumar Roy,
Anandarup Roy

Abstract: Secret sharing schemes are widely used to protect data by breaking the secret into pieces and sharing them amongst various members of a party. In this paper, our objective is to produce a repairable ramp scheme that allows for the retrieval of a share through a collection of members in the event of its loss. Repairable Threshold Schemes (RTSs) can be used in cloud storage and General Data Protection Regulation (GDPR) protocols. Secure and energy-efficient data transfer in sensor-based IoTs is built using ramp-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…At the same time, “the controller shall implement appropriate technical and organisational measures for ensuring that, by default, only personal data which are necessary for each specific purpose of the processing are processed”. Those principles, generally known under the names of privacy-by-design and privacy-by-default, were already investigated in many application fields such as electronic identification (eID) [ 47 ], electronic health records [ 48 ], and Smart Buildings [ 49 ]. Nevertheless, to the best of authors knowledge, no one has disclosed privacy-by-design insights in applying PWSs to construction site monitoring and management.…”
Section: Research Backgroundmentioning
confidence: 99%
“…At the same time, “the controller shall implement appropriate technical and organisational measures for ensuring that, by default, only personal data which are necessary for each specific purpose of the processing are processed”. Those principles, generally known under the names of privacy-by-design and privacy-by-default, were already investigated in many application fields such as electronic identification (eID) [ 47 ], electronic health records [ 48 ], and Smart Buildings [ 49 ]. Nevertheless, to the best of authors knowledge, no one has disclosed privacy-by-design insights in applying PWSs to construction site monitoring and management.…”
Section: Research Backgroundmentioning
confidence: 99%