Published September 24, 2023 | Version v1
Journal article Open

EFFICIENT AND SECURE STORAGE OPERATIONS FOR MOBILE CLOUD COMPUTING

  • 1. PhD student of Tashkent University of Information Technologies named after Muhammad al-Khwarizmi

Description

This paper presents a holistic security framework for securing data storage in the public cloud, with a focus on lightweight wireless data storage and retrieval devices without exposing the data content to cloud service providers.

Files

Shirinov.pdf

Files (1.2 MB)

Name Size Download all
md5:ed32ecb8ae48447bd3aeb23d126801ef
1.2 MB Preview Download

Additional details

References

  • References: 1. G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur., 9(1):1-30, 2006 2. J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute - based encryption. In SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 321-334, Washington, DC, USA, 2007. IEEE Computer Society. 3. D. Boneh, X. Boyen, and E.J. Goh. Hierarchical identity-based encryption with constant size ciphertext. Advances in Cryptology- EUROCRYPT 2005, pages 440-456, 2005.