2013
DOI: 10.1007/s11227-013-1055-z
|View full text |Cite
|
Sign up to set email alerts
|

Incremental proxy re-encryption scheme for mobile cloud computing environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
56
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
10

Relationship

3
7

Authors

Journals

citations
Cited by 86 publications
(59 citation statements)
references
References 26 publications
1
56
0
Order By: Relevance
“…Even this would cause a burden to the user; sharing it with others exposes it to risks. When the data is shared among many users, there has to be more flexibility in the encryption process to handle users of the group, manage the keys between users, and enforce the access control policy in order to protect the data confidentiality [57]. Sharing the data among a group of users adds more burden on the owner of the outsourced data.…”
Section: Data Availabilitymentioning
confidence: 99%
“…Even this would cause a burden to the user; sharing it with others exposes it to risks. When the data is shared among many users, there has to be more flexibility in the encryption process to handle users of the group, manage the keys between users, and enforce the access control policy in order to protect the data confidentiality [57]. Sharing the data among a group of users adds more burden on the owner of the outsourced data.…”
Section: Data Availabilitymentioning
confidence: 99%
“…The authors in [23] introduce a merger of attributebased encryption and proxy-based re-encryption [28] for offloading the computational intensive data access operations on an untrusted cloud server without disclosing any data contents. The proposed scheme is not suitable for mobile cloud environment due to the involvement of heavy computational load on the data owner.…”
Section: Existing Security Schemes For Mobile Cloud Computingmentioning
confidence: 99%
“…Each secrecy code is multiplied with the inverse of newly generated coding vector matrix to obtain the decrypted file as illustrated in Eq. (11).…”
Section: Coding-based Schemementioning
confidence: 99%