Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography.
Liang YanChunming RongGansen ZhaoPublished in: CloudCom (2009)
Keyphrases
- identity management
- cloud computing
- identity based cryptography
- key management
- security issues
- cloud computing environment
- data center
- data management
- access control
- cloud storage
- data privacy
- ad hoc networks
- digital signature
- cloud services
- security mechanisms
- service providers
- signcryption scheme
- wireless sensor networks
- bilinear pairings