Privacy-Aware Secure Anonymous Communication Protocol in CPSS Cloud Computing
نویسندگان
چکیده
منابع مشابه
Preserving User Privacy with Anonymous Authentication in Cloud Computing
Cloud computing offers its flexibility and dynamic nature in terms of its access to resources anytime and anywhere. All data and other resources in cloud storage are managed and controlled by the Cloud Service Provider. They provide security and ensure that the data is protected and free from any vulnerability. However, providing privacy through authentication mechanism is a big challenge. Most...
متن کاملSecure Energy Aware Anonymous Location Based Routing Protocol Formanet
In order to provide randomized routing ALERT (Anonymous Location-based and Efficient Routing) protocol is used. But the proposed protocol SEALERT will provide higher anonymity protection at lower cost. It also increases the nodal lifetime in the network. Thereby it increases the efficiency of transmission of packets. The proposed protocol dynamically partitions the network into area called zone...
متن کاملDistance-Aware Beamforming for Multiuser Secure Communication Systems
Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems) are possible alternatives to provide security for such applications. In this paper, we consid...
متن کاملPrivacy Aware Authentication Scheme for Distributed Mobile Cloud Computing
As mobile users generally access different types of mobile cloud computing services from a variety of service providers, it is extremely tedious for users to register different user accounts on each service provider and maintain corresponding private keys or passwords for authentication usage. In this paper, I propose a encryption method call Attribute encryption method. Cloud computing is a re...
متن کاملCommunication-aware Approaches for Transparent Checkpointing in Cloud Computing
Checkpoint/Restart or checkpointing is a fault tolerance technique which consists on taking frequent snapshots of an application, so that, in the event of a failure, the application’s state can be restored and the application’s execution continued without necessarily restarting it. The advent of Cloud Computing brought new challenges with regard to this technique as Fault Tolerance needs to be ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.2982961