2017 International Conference on Intelligent Computing and Control Systems (ICICCS) 2017
DOI: 10.1109/iccons.2017.8250658
|View full text |Cite
|
Sign up to set email alerts
|

Public key based third party auditing system using random masking and bilinear total signature for privacy in public cloud environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…Abuhasel, et al [34] developed a new framework for managing the resources in cloud-IIoT systems, where the Rivest Shamir Adleman (RSA) method was utilized for ensuring the security of each IIoT device. Here, the device authentication [35] was performed based on the processes of registration, login and verification by using the SHA-512 cryptographic model. Moreover, the RSA encryption mechanism was utilized to provide the additional level of security for the data stored in the IIoT systems.…”
Section: Related Workmentioning
confidence: 99%
“…Abuhasel, et al [34] developed a new framework for managing the resources in cloud-IIoT systems, where the Rivest Shamir Adleman (RSA) method was utilized for ensuring the security of each IIoT device. Here, the device authentication [35] was performed based on the processes of registration, login and verification by using the SHA-512 cryptographic model. Moreover, the RSA encryption mechanism was utilized to provide the additional level of security for the data stored in the IIoT systems.…”
Section: Related Workmentioning
confidence: 99%
“…Yanru Zhang, Xiang-Yang Li, and Zhu Han [2] proposed the idea of utilizing punishment to diminish CSP's motivation to cheat from an agreement hypothetical viewpoint, where cloud benefit clients can depend on an outside evaluator to check the calculation comes about when required. J.Raja, Dr. M.Ramakrishnan [3] proposed security protection of information utilizing TPA administrations. It uses people in general key examining and arbitrary concealing techniques that guarantee that TPA couldn't see client's information amid the evaluating procedure.…”
Section: Literature Reviewmentioning
confidence: 99%