Improving secured ID-based authentication for cloud computing through novel hybrid fuzzy-based homomorphic proxy re-encryption.
Vijaya Kumar VeerabathiranDevi ManiSangeetha KuppusamyBalu SubramaniamPriya VelayuthamSudhakar SenganSujatha KrishnamoorthyPublished in: Soft Comput. (2020)
Keyphrases
- cloud computing
- encryption scheme
- proxy re encryption
- security analysis
- identity management
- standard model
- public key
- public key encryption
- ciphertext
- security model
- computing resources
- secure manner
- data management
- data center
- private key
- network access
- authentication protocol
- cloud computing environment
- diffie hellman
- access control
- service providers
- secret key
- signature scheme
- security issues
- secret sharing scheme
- privacy preserving
- key distribution
- security requirements
- hash functions
- data sharing
- computing platform
- cloud computing platform
- relational databases
- cloud services
- information security
- security mechanisms