Published September 24, 2023
| Version v1
Journal article
Open
EFFICIENT AND SECURE STORAGE OPERATIONS FOR MOBILE CLOUD COMPUTING
Creators
- 1. PhD student of Tashkent University of Information Technologies named after Muhammad al-Khwarizmi
Description
This paper presents a holistic security framework for securing data storage in the public cloud, with a focus on lightweight wireless data storage and retrieval devices without exposing the data content to cloud service providers.
Files
Shirinov.pdf
Files
(1.2 MB)
Name | Size | Download all |
---|---|---|
md5:ed32ecb8ae48447bd3aeb23d126801ef
|
1.2 MB | Preview Download |
Additional details
References
- References: 1. G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur., 9(1):1-30, 2006 2. J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute - based encryption. In SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 321-334, Washington, DC, USA, 2007. IEEE Computer Society. 3. D. Boneh, X. Boyen, and E.J. Goh. Hierarchical identity-based encryption with constant size ciphertext. Advances in Cryptology- EUROCRYPT 2005, pages 440-456, 2005.