A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.
Kai FanJunxiong WangXin WangHui LiYintang YangPublished in: Sensors (2017)
Keyphrases
- cloud computing
- control scheme
- service providers
- security issues
- secure manner
- identity management
- closed loop
- cloud storage
- computing resources
- control system
- data center
- private cloud
- control strategy
- dynamic model
- network access
- cloud computing environment
- trusted computing
- distributed computing
- data management
- computing technologies
- access control
- internet services
- data privacy
- big data
- business models
- cloud services
- standard model
- computing platform
- sensitive data
- experimental data
- real time
- cloud computing platform