User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment

Nowadays, a lot of data is stored in the cloud for sharing purposes across various domains. The increasing number of security issues with cloud data raises confidentiality concerns about keeping these stored or shared data. Advanced encryption and decryption techniques in cloud computing environment...

Full description

Saved in:
Bibliographic Details
Main Authors: Tarun Kumar, Prabhat Kumar, Suyel Namasudra
Format: Article
Language:English
Published: Universidad Internacional de La Rioja (UNIR) 2025-01-01
Series:International Journal of Interactive Multimedia and Artificial Intelligence
Subjects:
Online Access:https://www.ijimai.org/journal/bibcite/reference/3451
Tags: Add Tag
No Tags, Be the first to tag this record!