Access the full text.
Sign up today, get DeepDyve free for 14 days.
In online services, a service provider (SP) manages access logs containing customers' buying histories. Therefore, user's information is revealed from the exposed logs if each customer can be linked. In fact, such information exposure has occurred due to the popularisation of online services. To cope with this problem, SPs may only have to delete access logs, but then no illegitimate users will be traced from the logs. In this paper, we propose a log management mechanism of solving problems. Specifically, we consider single sign on (SSO) systems, since plural access logs might be connected by one account. We construct our privacy-enhanced access log management mechanism based on the Wang-Wang-Susilo SSO system (TrustCom, 2013) which applies the Schuldt-Hanaoka nominative signature scheme (ACNS, 2011). Finally, we estimte the efficiency of the proposed system, computation time is at most just over 80 milliseconds on a PC, which seems sufficiently practical.
International Journal of Applied Cryptography – Inderscience Publishers
Published: Jan 1, 2017
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.