Reference Hub1
Secure Identity-Based Proxy Signature With Computational Diffie-Hellman for Cloud Data Management

Secure Identity-Based Proxy Signature With Computational Diffie-Hellman for Cloud Data Management

Dharavath Ramesh, Rahul Mishra, Damodar Reddy Edla, Madhu Sake
Copyright: © 2020 |Pages: 28
ISBN13: 9781799810827|ISBN10: 1799810828|ISBN13 Softcover: 9781799810834|EISBN13: 9781799810841
DOI: 10.4018/978-1-7998-1082-7.ch004
Cite Chapter Cite Chapter

MLA

Ramesh, Dharavath, et al. "Secure Identity-Based Proxy Signature With Computational Diffie-Hellman for Cloud Data Management." Modern Principles, Practices, and Algorithms for Cloud Security, edited by Brij B. Gupta, IGI Global, 2020, pp. 79-106. https://doi.org/10.4018/978-1-7998-1082-7.ch004

APA

Ramesh, D., Mishra, R., Edla, D. R., & Sake, M. (2020). Secure Identity-Based Proxy Signature With Computational Diffie-Hellman for Cloud Data Management. In B. Gupta (Ed.), Modern Principles, Practices, and Algorithms for Cloud Security (pp. 79-106). IGI Global. https://doi.org/10.4018/978-1-7998-1082-7.ch004

Chicago

Ramesh, Dharavath, et al. "Secure Identity-Based Proxy Signature With Computational Diffie-Hellman for Cloud Data Management." In Modern Principles, Practices, and Algorithms for Cloud Security, edited by Brij B. Gupta, 79-106. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-1082-7.ch004

Export Reference

Mendeley
Favorite

Abstract

This chapter explains a secure smart cloud framework based on identity-based proxy signature (IDBPS) scheme on Computational Diffie-Hellman (CD-H) assumption and AckIBE for data management. The objective of this chapter is to construct a secure hierarchical structure of homogeneous and heterogeneous cloud centers. This structure gives various types of computing services in the support of data analysis and information management. In this, the authors also introduce a security-related solution based on acknowledgment identity-based encryption (AckIBE), an IDBPS on computational Diffie-Hellman assumption, and identity-based proxy re-encryption to face critical security issues of the proposed framework.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.