2010 IEEE International Conference on Wireless Communications, Networking and Information Security 2010
DOI: 10.1109/wcins.2010.5541859
|View full text |Cite
|
Sign up to set email alerts
|

An identity-based security infrastructure for Cloud environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(13 citation statements)
references
References 6 publications
0
12
0
Order By: Relevance
“…On the other hand, the Metke and Ekl [35] discussed key components for security in smart grids and Rogers et al [39] presented an authentication and integrity approach that used digital signatures and timestamps. Recently identity-based cryptography was considered as good apparatus for secure cloud computing and grid computing as discussed in [42], [30] and [33].…”
Section: Other Approaches To Smart Grid Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, the Metke and Ekl [35] discussed key components for security in smart grids and Rogers et al [39] presented an authentication and integrity approach that used digital signatures and timestamps. Recently identity-based cryptography was considered as good apparatus for secure cloud computing and grid computing as discussed in [42], [30] and [33].…”
Section: Other Approaches To Smart Grid Securitymentioning
confidence: 99%
“…More precisely, [42] is mainly concerned with a new identity-based key agreement protocol based on RSA primitive, which is different from ours. [30] discusses applying identity-based signature schemes in non-hierarchical cloud environment.…”
Section: Other Approaches To Smart Grid Securitymentioning
confidence: 99%
“…This system provides features for signing and encrypting the messages that are exchanged between the web services and the clients. [5] …”
Section: An Identity Based Security Infrastructure For Cloud Environmentmentioning
confidence: 99%
“…Smart meters, along with power instrumentation and monitoring sensors, form the core of advanced metering infrastructure (AMI) aimed at maintaining high levels of performance, reliability, and manageability. Nevertheless, researchers have expressed their deep concern about the need to integrate a security infrastructure with the smart grid's AMI [4] [5]. The reason behind this concern is the fact that many smart grid projects are widely using advanced communications networks to link numerous sensors and smart meters for connecting consumers with the utility providers so as to exchange information bidirectionally.…”
Section: Introductionmentioning
confidence: 99%
“…Later attribute based encryption was extended to distributed identities and hierarchical attribute based encryption schemes. ABE systems now support many crucial functionality [15] required by security infrastructure.…”
Section: A Identity and Attribute Based Encryptionmentioning
confidence: 99%