Cloud access secure with identity based cryptography

0Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the fast evolution of networks and Internet, appeared the concept of the Cloud, the requirements in terms of safety become more and more essential. This requires the introduction of advanced authentication methods, access control and identity management, while respecting the constraints of the services offered by this evolution, such as data exchange capacity and resources of terminals. The aim of our work is to propose cloud security architecture to be able to establish secure sessions between the nodes of a cluster in the cloud, and allow to different users a secure access to their data.

Cite

CITATION STYLE

APA

Hamadi, H., Khireddine, A., & Tari, A. (2015). Cloud access secure with identity based cryptography. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9395, pp. 109–118). Springer Verlag. https://doi.org/10.1007/978-3-319-25744-0_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free