Using location based encryption to improve the security of data access in cloud computing.
Meer Soheil AbolghasemiMahdi Mokarrami SefidabReza Ebrahimi AtaniPublished in: ICACCI (2013)
Keyphrases
- data access
- cloud computing
- data management
- data confidentiality
- cloud storage
- security issues
- cloud computing environment
- data privacy
- data sharing
- big data
- distributed computing
- data center
- databases
- database management systems
- database systems
- database applications
- service providers
- computing infrastructure
- encryption scheme
- query processing
- data storage
- key management
- application development
- encryption algorithm
- database
- data integrity
- cloud services
- mobile devices
- security requirements
- information security
- data objects