2017 International Conference on Trends in Electronics and Informatics (ICEI) 2017
DOI: 10.1109/icoei.2017.8300719
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of re-encryption based security mechanism to authenticate shared access in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…However, the solution cannot guarantee user identity privacy and does not have the traceability of transactions and data. Mahakalkar and Sahare [14] proposed SAPA, a privacy protection authentication protocol based on sharing authority, which uses reencryption to realize data sharing between multiple users. The use of an access request matching mechanism realizes the user's identity is private, but cannot guarantee the traceability of data and transactions.…”
Section: Related Workmentioning
confidence: 99%
“…However, the solution cannot guarantee user identity privacy and does not have the traceability of transactions and data. Mahakalkar and Sahare [14] proposed SAPA, a privacy protection authentication protocol based on sharing authority, which uses reencryption to realize data sharing between multiple users. The use of an access request matching mechanism realizes the user's identity is private, but cannot guarantee the traceability of data and transactions.…”
Section: Related Workmentioning
confidence: 99%