2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS) 2016
DOI: 10.1109/icsess.2016.7883094
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing data and privacy security in mobile cloud computing through quantum cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 4 publications
0
9
0
Order By: Relevance
“…In the sector of corporate cloud security applications, several companies such as Acronis and Alibaba are also applying quantum-safe encryption to cloud data protection [503]. With respect to the application of QKD for cloud computing, a series of problems have been addressed, covering access control [504], authentication [505], data and privacy security [506], cloud containers [507], as well as cloud storage and data dynamics [508].…”
Section: Application Areasmentioning
confidence: 99%
“…In the sector of corporate cloud security applications, several companies such as Acronis and Alibaba are also applying quantum-safe encryption to cloud data protection [503]. With respect to the application of QKD for cloud computing, a series of problems have been addressed, covering access control [504], authentication [505], data and privacy security [506], cloud containers [507], as well as cloud storage and data dynamics [508].…”
Section: Application Areasmentioning
confidence: 99%
“…1 Encryption [21,76,55,25,26,65,28,29,30,31,66,34,7,79,90,40,91,42,74,59,44,45,46,47,60,87,50,51,81,52,53,93,83,54,61] 2 Authentication [22,63,64,32,33,67,68,69,35,70,41,57,43,71,72,75,48,49,…”
Section: # Solutionsmentioning
confidence: 99%
“…Time consumption [21,55,22,24,63,26,27,29,31,66,33,34,67,68,37,7,38,39,40,41,42,57,71,58,59,75,44,47,48,49,51,88] Communication overhead [24,64,65,32,66,33,67,68,36,7,91,85,86,41,56,42,57,71,58,75,49,…”
Section: Resources Usage Metricsmentioning
confidence: 99%
See 1 more Smart Citation
“…As can be seen that cryptography is a popular methodology for preserving privacy in different areas. Besides preserving privacy in data mining [22] or in cloud computing [23], it is also used to preserve privacy in social networks. As an illustration, Sakib and Huang [24] proposed a protocol based on elliptic curve cryptography to test whether two users in a social network are in an agreed distance range without disclosing their exact locations.…”
Section: Introductionmentioning
confidence: 99%