Proxy Re-encryption in a Privacy-Preserving Cloud Computing DRM Scheme.
Ronald PetrlicPublished in: CSS (2012)
Keyphrases
- cloud computing
- privacy preserving
- proxy re encryption
- data privacy
- standard model
- security model
- privacy preserving data mining
- keyword search
- trusted computing
- service providers
- data management
- ciphertext
- distributed computing
- privacy concerns
- private information
- privacy protection
- data sets
- sensitive information
- public key
- sensitive data
- xml data
- access control
- relational databases
- data mining