Secure Authentication and Reliable Cloud Storage Scheme for IoT-Edge-Cloud Integration.
Ajay ChaudharySateesh Kumar PeddojuVikas ChouhanPublished in: J. Grid Comput. (2023)
Keyphrases
- cloud storage
- cloud computing
- authentication scheme
- key distribution
- authentication mechanism
- authentication protocol
- computing resources
- distributed computing
- data center
- user authentication
- security analysis
- data management
- service providers
- private key
- key agreement
- secret key
- cloud services
- data encryption
- data integration
- management system
- key management
- file system
- cost effective
- data privacy
- grid computing
- diffie hellman