Privacy-Aware Secure Anonymous Communication Protocol in CPSS Cloud Computing

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preserving User Privacy with Anonymous Authentication in Cloud Computing

Cloud computing offers its flexibility and dynamic nature in terms of its access to resources anytime and anywhere. All data and other resources in cloud storage are managed and controlled by the Cloud Service Provider. They provide security and ensure that the data is protected and free from any vulnerability. However, providing privacy through authentication mechanism is a big challenge. Most...

متن کامل

Secure Energy Aware Anonymous Location Based Routing Protocol Formanet

In order to provide randomized routing ALERT (Anonymous Location-based and Efficient Routing) protocol is used. But the proposed protocol SEALERT will provide higher anonymity protection at lower cost. It also increases the nodal lifetime in the network. Thereby it increases the efficiency of transmission of packets. The proposed protocol dynamically partitions the network into area called zone...

متن کامل

Distance-Aware Beamforming for Multiuser Secure Communication Systems

Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems)  are possible alternatives to provide security for such applications. In this paper, we consid...

متن کامل

Privacy Aware Authentication Scheme for Distributed Mobile Cloud Computing

As mobile users generally access different types of mobile cloud computing services from a variety of service providers, it is extremely tedious for users to register different user accounts on each service provider and maintain corresponding private keys or passwords for authentication usage. In this paper, I propose a encryption method call Attribute encryption method. Cloud computing is a re...

متن کامل

Communication-aware Approaches for Transparent Checkpointing in Cloud Computing

Checkpoint/Restart or checkpointing is a fault tolerance technique which consists on taking frequent snapshots of an application, so that, in the event of a failure, the application’s state can be restored and the application’s execution continued without necessarily restarting it. The advent of Cloud Computing brought new challenges with regard to this technique as Fault Tolerance needs to be ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2020

ISSN: 2169-3536

DOI: 10.1109/access.2020.2982961