메뉴 건너뛰기




Volumn , Issue , 2013, Pages 62-67

A study of incremental cryptography for security schemes in mobile cloud computing environments

Author keywords

cloud computing; mobile cloud computing; privacy; security

Indexed keywords

CLOUD COMPUTING; COMPUTER SYSTEMS; CRYPTOGRAPHY; DATA PRIVACY; DIGITAL STORAGE; MOBILE CLOUD COMPUTING; MOBILE TELECOMMUNICATION SYSTEMS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84893408486     PISSN: 23247843     EISSN: 23247851     Source Type: Conference Proceeding    
DOI: 10.1109/ISWTA.2013.6688818     Document Type: Conference Paper
Times cited : (19)

References (27)
  • 2
    • 68249129760 scopus 로고    scopus 로고
    • Technical Report ucb/EECS-2009-28, EECS Department, University of California, Berkeley, Feb
    • M. Armbrust et al, "Above the Clouds: a Berkeley View of Cloud Computing", Technical Report ucb/EECS-2009-28, EECS Department, University of California, Berkeley, Feb. 2009.
    • (2009) Above the Clouds: A Berkeley View of Cloud Computing
    • Armbrust, M.1
  • 3
    • 84893390084 scopus 로고    scopus 로고
    • access data: 05 October, 2012
    • Pay-as-You-Go with Cloud Computing, http://technology.inc.com/2008/05/01/ pay-as-you-go-with-cloudcomputing/, access data: 05 October, 2012.
  • 5
    • 84893426225 scopus 로고    scopus 로고
    • Enhanced dynamic credential generation scheme for protection of user identity in mobilecloud computing
    • A. N. Khan, M. M. Kiah, S. A. Madani, and M. Ali, "Enhanced dynamic credential generation scheme for protection of user identity in mobilecloud computing", The Journal of Supercomputing, pp. 1-20, 2013.
    • (2013) The Journal of Supercomputing , pp. 1-20
    • Khan, A.N.1    Kiah, M.M.2    Madani, S.A.3    Ali, M.4
  • 7
    • 77951039985 scopus 로고    scopus 로고
    • Cloud computing for mobile users: Can offloading computation save energy?
    • April
    • K. Kumar and Y. H. Lu, "Cloud Computing For Mobile Users: Can Offloading Computation Save Energy?", IEEE Journal Computer, vol. 43, pp. 51-56, April 2010.
    • (2010) IEEE Journal Computer , vol.43 , pp. 51-56
    • Kumar, K.1    Lu, Y.H.2
  • 10
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • January
    • S. Subashini and V. Kavitha, "A Survey on Security Issues in Service Delivery Models of Cloud Computing", Journal of Network and Computer Applications, vol. 34, pp. 1-11, January 2011, doi: http://dx.doi.org/10.1016/j. jnca.2010.07.006.
    • (2011) Journal of Network and Computer Applications , vol.34 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 15
    • 78650121432 scopus 로고    scopus 로고
    • Authentication in the clouds: A framework and its application to mobile users
    • October
    • R. Chow et al., "Authentication in the Clouds: A Framework and its Application to Mobile Users", Proc. ACM Cloud Computing Security Workshop (CCSW'10), pp. 1-6, October 2010.
    • (2010) Proc. ACM Cloud Computing Security Workshop (CCSW'10) , pp. 1-6
    • Chow, R.1
  • 19
    • 80052758369 scopus 로고    scopus 로고
    • Meetings through the cloud: Privacy-preserving scheduling on mobile devices
    • November
    • I. Bilogrevica et al., "Meetings Through the Cloud: Privacy-preserving Scheduling on Mobile Devices", Journal of Systems and Software, vol. 84, pp. 1910-1927, November 2011.
    • (2011) Journal of Systems and Software , vol.84 , pp. 1910-1927
    • Bilogrevica, I.1
  • 21
    • 80053551895 scopus 로고    scopus 로고
    • Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing
    • October
    • W. Ren, L. Yu, R. Gao, and F. Xiong, "Lightweight and Compromise Resilient Storage Outsourcing with Distributed Secure Accessibility in Mobile Cloud Computing", Journal of Tsinghua Science and Technology, vol. 16, pp. 520-528, October 2011.
    • (2011) Journal of Tsinghua Science and Technology , vol.16 , pp. 520-528
    • Ren, W.1    Yu, L.2    Gao, R.3    Xiong, F.4
  • 24
    • 79961227180 scopus 로고    scopus 로고
    • Provable data possession of resource constrained mobile devices in cloud computing
    • July
    • J. Yang, H. Wang, J. Wang, C. Tan, and D. Yu1, "Provable Data Possession of Resource Constrained Mobile Devices in Cloud Computing", Journal of Networks, vol. 6, pp. 1033-1040, July 2011.
    • (2011) Journal of Networks , vol.6 , pp. 1033-1040
    • Yang, J.1    Wang, H.2    Wang, J.3    Tan, C.4    Yu, D.5
  • 25
    • 84862956001 scopus 로고    scopus 로고
    • Efficient and secure data storage operations for mobile cloud computing
    • Z. Zhou and D. Huang, "Efficient and Secure Data Storage Operations for Mobile Cloud Computing", IACR Cryptology ePrint Archive, 2011.
    • (2011) IACR Cryptology EPrint Archive
    • Zhou, Z.1    Huang, D.2
  • 27
    • 84887992156 scopus 로고    scopus 로고
    • Re-encryption-based key management towards secure and scalable mobile applications in clouds
    • P. K. Tysowski and M. A. Hasan, "Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds", IACR Cryptology ePrint Archive 2011, vol. 668, 2011.
    • (2011) IACR Cryptology EPrint Archive 2011 , vol.668
    • Tysowski, P.K.1    Hasan, M.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.