Privacy authentication using key attribute-based encryption in mobile cloud computing

@inproceedings{Kumar2017PrivacyAU,
  title={Privacy authentication using key attribute-based encryption in mobile cloud computing},
  author={Man Mohan Kumar and Reshmi Vijayan},
  year={2017}
}
Cloud Computing: Legal and Security Issues
TLDR
This paper highlights the Cloud Computing Legal, Contractual and Security challenges and gives some suggested solutions for some of the highlighted key challenges. Expand
Use of Cloud Computing In Higher Education of Pakistan
Cloud computing is an internet-based service of delivering technology to users and an important technological facility where mutual resources are delivered on demand. Usage of cloud computing inExpand
Secure Data Sharing in Multiple Cloud Servers Using Forward and Backward Secrecy
TLDR
RS-IBE provide both forward security and backward security of cipher text by introducing user functionalities and updating of cipherText thereby providing more stability to the hoarded facts. Expand

References

SHOWING 1-3 OF 3 REFERENCES
Attribute-based encryption without key cloning
TLDR
This work introduces a new type of attribute-based encryption scheme, called token-based attribute- based encryption (tk-ABE), that provides strong deterrence for key cloning, in the sense that delegation of keys reveals some personal information about the user. Expand
Privacy preserving EHR system using attribute-based infrastructure
TLDR
It is shown how new primitives in attribute-based cryptography can be used to construct a secure and privacy-preserving EHR system that enables patients to share their data among healthcare providers in a flexible, dynamic and scalable manner. Expand
Digital signets: self-enforcing protection of digital information (preliminary version)
TLDR
This paper introduces digital signets, a new technique for protecting digital content from illegal redistribution and motivates the study of the previously unexamined class of incompressible functions, analysis of which adds a cryptographic twist to communication complexity. Expand