A Trusted Third-party (TTP) based Encryption Scheme for Ensuring Data Confidentiality in Cloud Environment.
Syed S. RizviKatie CoverChristopher GatesPublished in: Complex Adaptive Systems (2014)
Keyphrases
- trusted third party
- encryption scheme
- digital signature
- public key
- multi party non repudiation
- third party
- security analysis
- privacy protection
- authentication protocol
- data sharing
- sensitive data
- credit card
- secret key
- data integrity
- key distribution
- security services
- lossless compression
- signature scheme
- data access
- data storage
- databases
- personal information
- data quality
- information sharing