Rasal et al. - Google Patents
Securing IoT with Trusted Authority Validation in Homomorphic Encryption Technique with ABERasal et al.
View PDF- Document ID
- 14714568187010276265
- Author
- Rasal M
- Agarwal M
- Agarwal M
- Rasal M
External Links
Snippet
Existing security system includes levels of encryption. IoT access is very important aspect. Failure of IoT security can cause more risks of physical and logical damage. IoT contain both functionalities including physical or computational process. In proposed approach, levels of …
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zhang et al. | Data security and privacy-preserving in edge computing paradigm: Survey and open issues | |
| US9332002B1 (en) | Authenticating and authorizing a user by way of a digital certificate | |
| US20180316495A1 (en) | Orthogonal access control for groups via multi-hop transform encryption | |
| Namasudra et al. | Secure and efficient data access control in cloud computing environment: a survey | |
| Wang et al. | A pre-authentication approach to proxy re-encryption in big data context | |
| Kumar et al. | Data outsourcing: A threat to confidentiality, integrity, and availability | |
| Udendhran | A hybrid approach to enhance data security in cloud storage | |
| Eltayieb et al. | ASDS: Attribute‐based secure data sharing scheme for reliable cloud environment | |
| Kim et al. | Group Delegated ID‐Based Proxy Reencryption for the Enterprise IoT‐Cloud Storage Environment | |
| Youn et al. | Authorized client‐side deduplication using CP‐ABE in cloud storage | |
| Meng et al. | A novel attribute-based signcryption scheme in cloud computing environments | |
| CN118487866A (en) | A data security protection method and protection system based on cloud computing service | |
| Bertino et al. | Securing named data networks: Challenges and the way forward | |
| Kumar et al. | ASP: advanced security protocol for security and privacy in cloud computing | |
| Fugkeaw | A secure and efficient data sharing scheme with outsourced signcryption and decryption in mobile cloud computing | |
| Sun et al. | Sanitizable Cross-Domain Access Control With Policy-Driven Dynamic Authorization | |
| Sujatha et al. | Efficient Mutual User Authentication Protocol to Share Files Using ID in Cloud Storage | |
| Rasal et al. | Securing IoT with Trusted Authority Validation in Homomorphic Encryption Technique with ABE | |
| Priya et al. | A survey: attribute based encryption for secure cloud | |
| Verma et al. | A hybrid two layer attribute based encryption for privacy preserving in public cloud | |
| Mahmoud et al. | A robust cryptographic‐based system for secure data sharing in cloud environments | |
| Satheesh et al. | A NOVEL HARDWARE PARAMETERS BASED CLOUD DATA ENCRYPTION AND DECRYPTION AGAINST UN-AUTHORIZED USERS | |
| Das | Fine‐Grained Access Through Attribute‐Based Encryption for Fog Computing | |
| Attia et al. | E-mail systems in cloud computing environment privacy, trust and security challenges | |
| Vidyasagar et al. | A Study on Security Services and Threats in Cloud Computing |