Provably Secure Authentication Approach for Data Security in Cloud Using Hashing, Encryption, and Chebyshev-Based Authentication.
Danish AhamadMd Mobin AkhtarShabi Alam HameedMahmoud Mohammad Mahmoud Al QeromPublished in: Int. J. Inf. Secur. Priv. (2022)
Keyphrases
- encryption decryption
- data security
- public key cryptography
- provably secure
- access control
- security model
- key management
- public key
- data management
- hash functions
- data confidentiality
- data centric
- secret key
- data privacy
- cloud computing
- security analysis
- privacy preserving data mining
- security mechanisms
- data sets
- standard model
- authentication protocol
- information security
- databases
- low dimensional
- smart card
- key distribution
- digital signature
- signature scheme
- data integrity
- encryption scheme