EFFICIENT AND SECURE STORAGE OPERATIONS FOR MOBILE CLOUD COMPUTING

Authors

  • Shirinov Laziz Toxirovich PhD student of Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Author

Keywords:

Attribute Based Data Storage, cloud computing, mobile, Privacy Preserving Cipher Policy Attribute-Based Encryption, secure

Abstract

This paper presents a holistic security framework for securing data storage in the public cloud, with a focus on lightweight wireless data storage and retrieval devices without exposing the data content to cloud service providers.

Downloads

Download data is not yet available.

References

G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur., 9(1):1-30, 2006

J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute - based encryption. In SP ’07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 321-334, Washington, DC, USA, 2007. IEEE Computer Society.

D. Boneh, X. Boyen, and E.J. Goh. Hierarchical identity-based encryption with constant size ciphertext. Advances in Cryptology- EUROCRYPT 2005, pages 440-456, 2005.

Downloads

Published

2023-09-24 — Updated on 2023-09-24

How to Cite

Shirinov, L. (2023). EFFICIENT AND SECURE STORAGE OPERATIONS FOR MOBILE CLOUD COMPUTING. Science technology&Digital Finance, 1(2), 4-9. https://bestjournalup.com/index.php/stdf/article/view/df

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 > >>