An identity-based public auditing protocol in cloud-assisted IoT.
Asal RamezaniMaryam Rajabzadeh AsaarPublished in: Clust. Comput. (2022)
Keyphrases
- cloud computing
- key management
- key distribution
- provably secure
- security protocols
- authentication and key agreement
- big data
- signature scheme
- lightweight
- management system
- formal analysis
- group communication
- wireless sensor networks
- bilinear pairings
- access control
- authentication protocol
- data center
- standard model
- elliptic curve
- communication protocol
- cryptographic protocols
- resource constrained
- secret key
- signcryption scheme
- statistical databases
- identity based cryptography
- fault tolerant
- encryption scheme
- tcp ip
- security services
- secure communication