A secure data service mechanism with temporary allow access in mobile cloud computing

Publish Year: 1394
نوع سند: مقاله کنفرانسی
زبان: English
View: 691

This Paper With 9 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

COMCONF01_724

تاریخ نمایه سازی: 8 آذر 1394

Abstract:

To provide privacy and enhance security for mobile cloud users, a few proposals have been presented recently. However we argue that most of them, dont achieve all goals of mobile cloud computing In this paper, we propose a secure data service (DSMCC) an efficient and secure data service mechanism in mobile cloud computing, which enables the mobile users to enjoy a secure outsourced data service at the minimized security management overhead and power consumption. Our protocol is flexible to operate and scalable with the growth of data sharers and Protect the mobile user’s data from leaking to the cloud, also Guarantee the authorized sharers can access the data for time period i, while unauthorized sharers can not learn anything about data, and Reduce the communication cost of mobile user.our analysis show that this scheme has more advantages than other mobile data service mechanism , which could better cater the requirements in mobile cloud computing scenarios

Authors

Najmeh mashhadi

Department of computer Engineering Science and Research university of Tehran.

seyyed mohsen hashemi

Assistant Professor at Science and Research university of Tehran.

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • ELGAMAL, T.(1984)" A public key cryptosystem and a signature scheme ...
  • ATENIESE.G, FU(2005) "Improved proxy re-encryption schemes with applications to secure ...
  • نمایش کامل مراجع