2015 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC) 2015
DOI: 10.1109/iccpeic.2015.7259477
|View full text |Cite
|
Sign up to set email alerts
|

An efficient group authentication mechanism supporting key confidentiality, key freshness and key authentication in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 9 publications
0
3
0
2
Order By: Relevance
“…The model offered centralized management of secret keys for data sharing but was susceptible to brute-force attacks due to data symmetry. The authors in [73] proposed a digital signature and advanced encryption standard framework for achieving very reliable cloud data security and user authentication. The model requires the data owner (sender) who intends to store the original documents in the cloud for sharing with the data users (recipients) to first create a digital signature for the document based on SHA-based computation of a hash value representation of the original document.…”
Section: Related Workmentioning
confidence: 99%
“…The model offered centralized management of secret keys for data sharing but was susceptible to brute-force attacks due to data symmetry. The authors in [73] proposed a digital signature and advanced encryption standard framework for achieving very reliable cloud data security and user authentication. The model requires the data owner (sender) who intends to store the original documents in the cloud for sharing with the data users (recipients) to first create a digital signature for the document based on SHA-based computation of a hash value representation of the original document.…”
Section: Related Workmentioning
confidence: 99%
“…producer (or at least potential 'second hand' v.urtd in Yttlich people" producer) of media messages. This now 'live', it may well be that in our should not be dismissed as a utopian contemporary v.urtd it is far more idea, not even in 'developing important to teach school pupils (and societies' (see Nair & White, 1987). even those at tertiary level) how to The Post-Fordist information critically read an everyday media text technologies through YvtIich society rather than how to critically read " can solve the impediments in Shakespeare.…”
Section: Educanng For Democracymentioning
confidence: 99%
“…Besides, they used data partitioning to ensure their integrity and RSA encryption to ensure confidentiality. In [56], authors proposed a group authentication technique that supports the generation and refresh of keys. In plus, they used double encryption to guarantee data confidentiality.…”
Section: Survey Articlementioning
confidence: 99%