Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing.
Wei LuoWenping MaPublished in: Clust. Comput. (2019)
Keyphrases
- cloud computing
- security issues
- data center
- computing resources
- data management
- identity management
- cloud storage
- secure manner
- distributed computing
- service providers
- big data
- cloud computing environment
- business models
- computing technologies
- private cloud
- computing platform
- remote attestation
- trusted computing
- database systems
- security mechanisms
- cost effective
- service level agreements
- map reduce
- computing infrastructure
- cloud platform
- privacy preserving
- database
- cloud computing platform