A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach.
Abdul Nasir KhanMiss Laiha Mat KiahMazhar AliShahaboddin ShamshirbandAtta ur Rehman KhanPublished in: J. Grid Comput. (2015)
Keyphrases
- mobile users
- encryption scheme
- mobile phone
- standard model
- cloud computing
- security analysis
- mobile devices
- context aware
- public key
- mobile computing
- information sources
- mobile applications
- mobile services
- user mobility
- data sharing
- secret key
- security model
- ciphertext
- proxy re encryption
- mobile agents
- lossless compression
- hash functions
- data sets
- cost effective
- data analysis