International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014) 2014
DOI: 10.1109/icraie.2014.6909186
|View full text |Cite
|
Sign up to set email alerts
|

Data security protocol for cloudlet based architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…A data security protocol for cloudlet-base architecture was proposed by Jindal and Dave [9]. The cloudlet uses a perfect forward secrecy property and is integrated with the base station.…”
Section: Related Workmentioning
confidence: 99%
“…A data security protocol for cloudlet-base architecture was proposed by Jindal and Dave [9]. The cloudlet uses a perfect forward secrecy property and is integrated with the base station.…”
Section: Related Workmentioning
confidence: 99%
“…Maher Jridi et al [ 31 ] also offloaded the image compression and encryption tasks to the digital gateway on the edge of network. Manisha Jindal et al [ 32 ] used a trustworthy edge server to implement a secure forward encryption algorithm to prevent data from being acquired by unauthenticated users and untrusted service providers. Therefore, edge servers can be a key component in the secure data processing framework for mobile cloud storage and resemble the cloud trusted domain which is introduced in [ 33 ].…”
Section: Related Workmentioning
confidence: 99%