Login / Signup
Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud.
B. R. Purushothama
B. Shrinath
B. B. Amberker
Published in:
Int. J. Inf. Commun. Technol. (2013)
Keyphrases
</>
cloud storage
access control
proxy re encryption
ciphertext
security model
cloud computing
cloud services
standard model
service providers
encryption scheme
security requirements
security mechanisms
public key
secret key
security policies
role based access control
distributed computing
access control mechanism
security analysis
access control policies
web services
virtual machine
encryption algorithm
file system
service platform
data center
low cost