EFFICIENT AND SECURE STORAGE OPERATIONS FOR MOBILE CLOUD COMPUTING
Keywords:
Attribute Based Data Storage, cloud computing, mobile, Privacy Preserving Cipher Policy Attribute-Based Encryption, secureAbstract
This paper presents a holistic security framework for securing data storage in the public cloud, with a focus on lightweight wireless data storage and retrieval devices without exposing the data content to cloud service providers.
Downloads
References
G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur., 9(1):1-30, 2006
J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute - based encryption. In SP ’07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 321-334, Washington, DC, USA, 2007. IEEE Computer Society.
D. Boneh, X. Boyen, and E.J. Goh. Hierarchical identity-based encryption with constant size ciphertext. Advances in Cryptology- EUROCRYPT 2005, pages 440-456, 2005.
Published
Issue
Section
License
Copyright (c) 2023 Shirinov Laziz Toxirovich
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.