Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud.
B. R. PurushothamaB. ShrinathB. B. AmberkerPublished in: Int. J. Inf. Commun. Technol. (2013)
Keyphrases
- cloud storage
- access control
- proxy re encryption
- ciphertext
- security model
- cloud computing
- cloud services
- standard model
- service providers
- encryption scheme
- security requirements
- security mechanisms
- public key
- secret key
- security policies
- role based access control
- distributed computing
- access control mechanism
- security analysis
- access control policies
- web services
- virtual machine
- encryption algorithm
- file system
- service platform
- data center
- low cost