Login / Signup
A lightweight possession proof scheme for outsourced files in mobile cloud computing based on chameleon hash function.
Wei Ren
Yuliang Liu
Published in:
Int. J. Comput. Sci. Eng. (2014)
Keyphrases
</>
lightweight
cloud computing
hash functions
service providers
block cipher
data center
middleware architecture
handheld devices
computing resources
authentication protocol
data management
cloud computing environment
similarity search
locality sensitive hashing
third party
hamming distance
data distribution
mobile phone
mobile devices
cloud computing platform
security issues
data sets
cloud services
mobile computing
mobile learning
wireless sensor networks
data mining
development environments
mobile applications
binary codes
nearest neighbor search
mobile users
file system
intrusion detection
web services
databases