Cloud auditing and authentication scheme for establishing privacy preservation.
Rajesh BinguS. JothilakshmiPublished in: Multim. Tools Appl. (2024)
Keyphrases
- privacy preservation
- authentication scheme
- cloud computing
- data privacy
- privacy preserving
- smart card
- sensitive data
- user authentication
- secret key
- privacy preserving data mining
- data quality
- sensitive information
- public key
- data mining
- privacy protection
- private information
- authentication protocol
- security analysis
- access control
- data management
- data storage
- information security
- third party
- cost effective
- lightweight