Improved Security Using Traceable Ciphertext Policy Attribute-Based Encryption in Mobile Cloud Computing:

Naveen, P. V. and Poongodi, A. (2025) Improved Security Using Traceable Ciphertext Policy Attribute-Based Encryption in Mobile Cloud Computing:. In: Pioneering AI and Data Technologies for Next-Gen Security, IoT, and Smart Ecosystems. IGI Global Scientific Publishing, pp. 1-24.

Full text not available from this repository. (Request a copy)

Abstract

P. V. Naveen Vels Institute of Science, Technology, and Advance Studies, India https://orcid.org/0009-0005-2415-4930 A. Poongodi Vels Institute of Science, Technology, and Advance Studies, India Improved Security Using Traceable Ciphertext Policy Attribute-Based Encryption in Mobile Cloud Computing

Mobile cloud computing, also known as MCC, has become increasingly popular among users of high-speed mobile devices. Users face dangers to their privacy and security due to several factors, including the growing number of subscribers to MCC and the possibility of unauthorized access to user data. Within the realm of conventional research, efforts are made to construct a safe model to maintain the data in MCC. There are a number of difficulties and gaps in MCC that represent severe dangers to security policy despite the fact that it provides modeling for a variety of architectures. The purpose of this research article is to offer an attribute-based encryption (ABE) system as a means of mitigating the effects of such problems. By facilitating data separation and storage in cloud servers, the ABE solution contributes to the facilitation of white-box traceability and facilitates direct refurbishment.
chapter 1 6 13 2025 1 24 10.4018/979-8-3373-4672-4.ch001 20250624011531 https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3373-4672-4.ch001 https://www.igi-global.com/viewtitle.aspx?TitleId=383970 Validating Clinical Applications of Digital Health Solutions and Managing Associated Risk Management. S.Agarwal 2023 134 4 FMDB Transactions on Sustainable Management Letters AgarwalS. (2023). Validating Clinical Applications of Digital Health Solutions and Managing Associated Risk Management.FMDB Transactions on Sustainable Management Letters, 1(4), 134–143. 1 10.69888/FTSCL.2024.000177 10.1109/ACCESS.2020.2969957 10.1007/s11277-019-06872-3 Survey on Attribute-based Encryption in Cloud Computing P. R.Ancy 2020 863 5 International Journal of Network Security AncyP. R.KrishnaA. V.BalachandranK.BalamuruganM.PrakasiO. G. (2020). Survey on Attribute-based Encryption in Cloud Computing. International Journal of Network Security, 22(5), 863–868. 22 10.69888/FTSCL.2024.000241 10.31149/ijefsd.v6i1.5172 10.2139/ssrn.3606261 10.1007/978-981-15-4739-3_92 10.1109/TVT.2020.3027568 10.1109/JIOT.2021.3055541 10.23919/JCC.2021.03.009 10.1109/TMC.2020.2970705 Defend and Secure: A Strategic and Implementation Framework for Robust Data Breach Prevention. K. D.Jasper 2024 17 1 AVE Trends In Intelligent Computing Systems JasperK. D.JaishnavM. N.ChowdhuryM. F.BadhanR.SivakaniR. (2024). Defend and Secure: A Strategic and Implementation Framework for Robust Data Breach Prevention.AVE Trends In Intelligent Computing Systems, 1(1), 17–31. 1 Efficient Real-time Tamil Character Recognition via Deep Vision Architecture. J.Jeba 2024 1 1 AVE Trends In Intelligent Computing Systems JebaJ.BoseS. R.ReginR.SudhanM. B.Suman RajestS.BabuP. R. (2024). Efficient Real-time Tamil Character Recognition via Deep Vision Architecture.AVE Trends In Intelligent Computing Systems, 1(1), 1–16. 1 10.69888/FTSCL.2024.000181 10.1109/ACCESS.2021.3104899 10.3390/s20174720 10.1109/I-SMAC49090.2020.9243532 Narezal, K., & Kalmani, V. (2020). “Study of lightweight ABE for cloud based IoT”, In 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 134-137). IEEE, Palladam, India. A Survey on Security Issues in Mobile Cloud Computing (MCC P. V.Naveen 2020 18729 6 Solid State Technology NaveenP. V. (2020). A Survey on Security Issues in Mobile Cloud Computing (MCC. Solid State Technology, 63(6), 18729–18745. 63 10.4018/979-8-3693-0502-7 10.69888/FTSCS.2024.000201 10.1109/ACCESS.2021.3067284 10.1109/ICCC49849.2020.9238987 10.1007/s10619-021-07340-3 Development and Testing of Incorporated ASM with MVP Architecture Model for Android Mobile App Development. N.Rajasekaran 2023 65 2 FMDB Transactions on Sustainable Computing Systems RajasekaranN.JagatheesanS. M.KrithikaS.AlbanchezJ. S. (2023). Development and Testing of Incorporated ASM with MVP Architecture Model for Android Mobile App Development.FMDB Transactions on Sustainable Computing Systems, 1(2), 65–76. 1 10.4018/978-1-6684-9189-8 10.4018/978-1-6684-9189-8.ch018 Regin, R., Khanna, A. A., Krishnan, V., Gupta, M., & Bose, R. S., & Rajest, S. S. (2023). Information design and unifying approach for secured data sharing using attribute-based access control mechanisms. In Recent Developments in Machine and Human Intelligence (pp. 256–276). IGI Global, USA. 10.69888/FTSCL.2024.000185 10.1007/978-3-030-79757-7_30 Transforming Medical Education: Multi-Keyword Ranked Search in Cloud Environment. R.Saxena 2023 135 3 FMDB Transactions on Sustainable Computing Systems SaxenaR.SharmaV.SaxenaR. R. (2023). Transforming Medical Education: Multi-Keyword Ranked Search in Cloud Environment.FMDB Transactions on Sustainable Computing Systems, 1(3), 135–146. 1 10.1016/j.jisa.2020.102559 10.69888/FTSCL.2024.000182 10.1016/j.comnet.2021.108196 Cognitive artificial intelligence systems for proactive threat hunting in AI-driven cloud applications. V. R.Vemula 2024 173 3 AVE Trends in Intelligent Computing Systems VemulaV. R. (2024). Cognitive artificial intelligence systems for proactive threat hunting in AI-driven cloud applications.AVE Trends in Intelligent Computing Systems, 1(3), 173–183. 1 10.1155/2020/8861114 10.1109/ACCESS.2020.2975813 Chronostamp: A general-purpose run-time for data-flow computing in a distributed environment. E.Zanardo 2024 106 2 AVE Trends in Intelligent Computing Systems ZanardoE. (2024). Chronostamp: A general-purpose run-time for data-flow computing in a distributed environment.AVE Trends in Intelligent Computing Systems, 1(2), 106–115. 1 10.1155/2021/8513869 Attribute-based Encryption for Cloud Computing Access Control: A survey Y.Zhang 2020 10.1145/3398036 1 4 ACM Computing Surveys ZhangY.DengR. H.XuS.SunJ.LiQ.ZhengD. (2020). Attribute-based Encryption for Cloud Computing Access Control: A survey. ACM Computing Surveys, 53(4), 1–41. 53 10.1007/s12083-020-00918-1

Item Type: Book Section
Subjects: Computer Applications > Cloud Computing
Domains: Computer Science
Depositing User: Mr IR Admin
Date Deposited: 31 Aug 2025 10:59
Last Modified: 31 Aug 2025 10:59
URI: https://ir.vistas.ac.in/id/eprint/10764

Actions (login required)

View Item
View Item