2020
DOI: 10.1007/s00500-020-05119-9
|View full text |Cite|
|
Sign up to set email alerts
|

RETRACTED ARTICLE: Improving secured ID-based authentication for cloud computing through novel hybrid fuzzy-based homomorphic proxy re-encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…In Veerabathiran et al. ( 2020 ), the authors focus on security in a cloud computing environment, providing a homomorphic proxy re-encryption that enables various cloud users to share INFO that they redistributed HPRE encrypted utilizing their PubKs with the plausibility by a close procedure such as INFO remotely. Thereby, precision of assessment results in cloud computing environment security risk assessment to take care of the issue of the multifaceted nature of the system and the classified fuzzy cloud method applied to cloud computing environment chance ID stage that captures the cloud computing environment risk factors through a complete investigation of cloud computing environment security area.…”
Section: Literature Review and Contributionsmentioning
confidence: 99%
“…In Veerabathiran et al. ( 2020 ), the authors focus on security in a cloud computing environment, providing a homomorphic proxy re-encryption that enables various cloud users to share INFO that they redistributed HPRE encrypted utilizing their PubKs with the plausibility by a close procedure such as INFO remotely. Thereby, precision of assessment results in cloud computing environment security risk assessment to take care of the issue of the multifaceted nature of the system and the classified fuzzy cloud method applied to cloud computing environment chance ID stage that captures the cloud computing environment risk factors through a complete investigation of cloud computing environment security area.…”
Section: Literature Review and Contributionsmentioning
confidence: 99%
“…This method avoids computation burden and is effective for resource-limited objects. Veerabathiran, et al, (2020) introduced a Homomorphic Proxy Re-Encryption (HPRE) scheme in cloud computing. The basic trial was made in this method for exhibiting lawfully unauthorized access.…”
Section: Authentication-based Approachesmentioning
confidence: 99%
“…Vijaya Kumar Veerabathiran et al [16] introduced a homomorphic proxy-based reencryption novel practice for ID-based multi-cloud computing to share cloud user information remotely from one end to the other. This model presented an access control mechanism for cloud end users to ensure resource management with confidential data access and control.…”
Section: Related Workmentioning
confidence: 99%