[go: up one dir, main page]

Rasal et al. - Google Patents

Securing IoT with Trusted Authority Validation in Homomorphic Encryption Technique with ABE

Rasal et al.

View PDF
Document ID
14714568187010276265
Author
Rasal M
Agarwal M
Agarwal M
Rasal M

External Links

Snippet

Existing security system includes levels of encryption. IoT access is very important aspect. Failure of IoT security can cause more risks of physical and logical damage. IoT contain both functionalities including physical or computational process. In proposed approach, levels of …
Continue reading at core.ac.uk (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Zhang et al. Data security and privacy-preserving in edge computing paradigm: Survey and open issues
US9332002B1 (en) Authenticating and authorizing a user by way of a digital certificate
US20180316495A1 (en) Orthogonal access control for groups via multi-hop transform encryption
Namasudra et al. Secure and efficient data access control in cloud computing environment: a survey
Wang et al. A pre-authentication approach to proxy re-encryption in big data context
Kumar et al. Data outsourcing: A threat to confidentiality, integrity, and availability
Udendhran A hybrid approach to enhance data security in cloud storage
Eltayieb et al. ASDS: Attribute‐based secure data sharing scheme for reliable cloud environment
Kim et al. Group Delegated ID‐Based Proxy Reencryption for the Enterprise IoT‐Cloud Storage Environment
Youn et al. Authorized client‐side deduplication using CP‐ABE in cloud storage
Meng et al. A novel attribute-based signcryption scheme in cloud computing environments
CN118487866A (en) A data security protection method and protection system based on cloud computing service
Bertino et al. Securing named data networks: Challenges and the way forward
Kumar et al. ASP: advanced security protocol for security and privacy in cloud computing
Fugkeaw A secure and efficient data sharing scheme with outsourced signcryption and decryption in mobile cloud computing
Sun et al. Sanitizable Cross-Domain Access Control With Policy-Driven Dynamic Authorization
Sujatha et al. Efficient Mutual User Authentication Protocol to Share Files Using ID in Cloud Storage
Rasal et al. Securing IoT with Trusted Authority Validation in Homomorphic Encryption Technique with ABE
Priya et al. A survey: attribute based encryption for secure cloud
Verma et al. A hybrid two layer attribute based encryption for privacy preserving in public cloud
Mahmoud et al. A robust cryptographic‐based system for secure data sharing in cloud environments
Satheesh et al. A NOVEL HARDWARE PARAMETERS BASED CLOUD DATA ENCRYPTION AND DECRYPTION AGAINST UN-AUTHORIZED USERS
Das Fine‐Grained Access Through Attribute‐Based Encryption for Fog Computing
Attia et al. E-mail systems in cloud computing environment privacy, trust and security challenges
Vidyasagar et al. A Study on Security Services and Threats in Cloud Computing