Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control
Outsourcing confidential data to an untrusted cloud system and allowing mobile device access have raised numerous security issues and delay in access. The main concern is the availability of the required data and the integrity in the decision to allow access to the data. The first line of...
| Main Authors: | Jamal, Fara, Abdullah, Mohd Taufik, Mohd Hanapi, Zurina, Abdullah, Azizol |
|---|---|
| Format: | Article |
| Published: |
IAEME Publication
2020
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/87543/ |
Similar Items
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by: Jamal, Fara
Published: (2021)
by: Jamal, Fara
Published: (2021)
Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling
by: Jamal, Fara, et al.
Published: (2019)
by: Jamal, Fara, et al.
Published: (2019)
Cloud-based secure healthcare framework by using enhanced ciphertext policy attribute-based encryption scheme
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021)
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021)
Towards virtuous cloud data storage using access policy hiding in ciphertext policy attribute-based encryption
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021)
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)
by: Mohd Satar, Siti Dhalila
Published: (2023)
Cache-Aware Multi-Core Operating System Scheduler Design
by: Lam, Jun Wei
Published: (2009)
by: Lam, Jun Wei
Published: (2009)
Enhanced Bring your Own Device (BYOD) environment security based on blockchain technology
by: Jamal, Fara, et al.
Published: (2018)
by: Jamal, Fara, et al.
Published: (2018)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
Frequency aware task scheduling using DVFS for energy efficiency in Cloud data centre
by: Samual, Joshua, et al.
Published: (2023)
by: Samual, Joshua, et al.
Published: (2023)
Toward efficient attribute-based searchable encryption for access control over blockchain
by: Hussein, Al-Abadi Hassan Mansur
Published: (2021)
by: Hussein, Al-Abadi Hassan Mansur
Published: (2021)
Improve cloud computing security using RSA encryption with Fermat's little theorem
by: Mohamed Shereek, Balkees, et al.
Published: (2014)
by: Mohamed Shereek, Balkees, et al.
Published: (2014)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
Cache replacement algorithm using hierarchical allocation scheduling
by: Mohd Sharif, Mohammad Faizal
Published: (2014)
by: Mohd Sharif, Mohammad Faizal
Published: (2014)
Secure Access To Authorized Resources Based On Fingerprint Authentication
by: Elmadani, Ahmed Baba
Published: (2003)
by: Elmadani, Ahmed Baba
Published: (2003)
Cost-effective traffic scheduling for Cloud resource management
by: Shareef, Zayd Ashraf Najeeb, et al.
Published: (2015)
by: Shareef, Zayd Ashraf Najeeb, et al.
Published: (2015)
A systematic review of Bring Your Own Device (BYOD) authentication technique
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
Performance analysis for cloud query encryption
by: Ali Raheem, Zainalabideen, et al.
Published: (2019)
by: Ali Raheem, Zainalabideen, et al.
Published: (2019)
Research on design and implementation of secure
attribute-based encryption framework for body sensor networks
by: Tan, Yar Ling
Published: (2014)
by: Tan, Yar Ling
Published: (2014)
Hierarchical secure virtualization model for cloud.
by: Manavi, Sina, et al.
Published: (2012)
by: Manavi, Sina, et al.
Published: (2012)
Minimum completion time for power-aware scheduling in cloud computing
by: Mehdi, Nawfal A., et al.
Published: (2012)
by: Mehdi, Nawfal A., et al.
Published: (2012)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
A multi-level scheduling for resource provisioning mechanism in cloud systems
by: Mohamaddiah, Mohd Hairy, et al.
Published: (2017)
by: Mohamaddiah, Mohd Hairy, et al.
Published: (2017)
Implementation of secure email server in cloud environment
by: Madi, Nadim K. M., et al.
Published: (2012)
by: Madi, Nadim K. M., et al.
Published: (2012)
Multi-objective grey wolf optimizer algorithm for task scheduling in cloud-fog computing
by: Saif, Faten A., et al.
Published: (2023)
by: Saif, Faten A., et al.
Published: (2023)
An enhanced discrete symbiotic organism search algorithm for optimal task scheduling in the cloud
by: Sa’ad, Suleiman, et al.
Published: (2021)
by: Sa’ad, Suleiman, et al.
Published: (2021)
On the security defects of an image encryption scheme
by: C., Li, et al.
Published: (2009)
by: C., Li, et al.
Published: (2009)
Encryption method for SCADA security enhancement
by: Shahzad, Aamir, et al.
Published: (2014)
by: Shahzad, Aamir, et al.
Published: (2014)
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000)
by: Al-Qdah, Majdi Taysir
Published: (2000)
IoT data encryption algorithm for security
by: Kanaan Ismael, Marwan
Published: (2020)
by: Kanaan Ismael, Marwan
Published: (2020)
Secure Encrypted Steganography Graphical Password scheme for Near Field Communication smartphone access control system
by: Cheong, S., et al.
Published: (2014)
by: Cheong, S., et al.
Published: (2014)
A review of cloud security based on cryptographic mechanisms
by: Abd, Sura Khalil, et al.
Published: (2014)
by: Abd, Sura Khalil, et al.
Published: (2014)
Chaotic asymmetric encryption process for data security.
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
Authorized Redundant Check Support in a Hybrid Cloud Environment
by: Durgadevi, ., et al.
Published: (2024)
by: Durgadevi, ., et al.
Published: (2024)
Message based random variable length key encryption algorithm.
by: Mirvaziri, Hamid, et al.
Published: (2009)
by: Mirvaziri, Hamid, et al.
Published: (2009)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
A fault-intrusion-tolerant system and deadline-aware algorithm for scheduling scientific workflow in the cloud
by: Farid, Mazen, et al.
Published: (2021)
by: Farid, Mazen, et al.
Published: (2021)
Rough web caching
by: Sulaiman, Sarina, et al.
Published: (2009)
by: Sulaiman, Sarina, et al.
Published: (2009)
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
by: Salam, M., et al.
Published: (2015)
by: Salam, M., et al.
Published: (2015)
Investigation and statistical simulation of variation aware 14nm SRAM cache memory architecture
by: Pour, Somayeh Rahimi
Published: (2011)
by: Pour, Somayeh Rahimi
Published: (2011)
Encrypted quick response scheme for hotel check-in and access control system
by: Cheong, S., et al.
Published: (2017)
by: Cheong, S., et al.
Published: (2017)
Similar Items
-
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by: Jamal, Fara
Published: (2021) -
Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling
by: Jamal, Fara, et al.
Published: (2019) -
Cloud-based secure healthcare framework by using enhanced ciphertext policy attribute-based encryption scheme
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021) -
Towards virtuous cloud data storage using access policy hiding in ciphertext policy attribute-based encryption
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021) -
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)