Naveen, P. V. and Poongodi, A. (2025) Improved Security Using Traceable Ciphertext Policy Attribute-Based Encryption in Mobile Cloud Computing:. In: Pioneering AI and Data Technologies for Next-Gen Security, IoT, and Smart Ecosystems. IGI Global Scientific Publishing, pp. 1-24.
Full text not available from this repository. (Request a copy)Abstract
P. V. Naveen Vels Institute of Science, Technology, and Advance Studies, India https://orcid.org/0009-0005-2415-4930 A. Poongodi Vels Institute of Science, Technology, and Advance Studies, India Improved Security Using Traceable Ciphertext Policy Attribute-Based Encryption in Mobile Cloud Computing
Mobile cloud computing, also known as MCC, has become increasingly popular among users of high-speed mobile devices. Users face dangers to their privacy and security due to several factors, including the growing number of subscribers to MCC and the possibility of unauthorized access to user data. Within the realm of conventional research, efforts are made to construct a safe model to maintain the data in MCC. There are a number of difficulties and gaps in MCC that represent severe dangers to security policy despite the fact that it provides modeling for a variety of architectures. The purpose of this research article is to offer an attribute-based encryption (ABE) system as a means of mitigating the effects of such problems. By facilitating data separation and storage in cloud servers, the ABE solution contributes to the facilitation of white-box traceability and facilitates direct refurbishment.
  chapter 1  6 13 2025   1 24   10.4018/979-8-3373-4672-4.ch001 20250624011531 https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3373-4672-4.ch001   https://www.igi-global.com/viewtitle.aspx?TitleId=383970      Validating Clinical Applications of Digital Health Solutions and Managing Associated Risk Management. S.Agarwal 2023 134 4 FMDB Transactions on Sustainable Management Letters AgarwalS. (2023). Validating Clinical Applications of Digital Health Solutions and Managing Associated Risk Management.FMDB Transactions on Sustainable Management Letters, 1(4), 134–143. 1   10.69888/FTSCL.2024.000177   10.1109/ACCESS.2020.2969957   10.1007/s11277-019-06872-3   Survey on Attribute-based Encryption in Cloud Computing P. R.Ancy 2020 863 5 International Journal of Network Security AncyP. R.KrishnaA. V.BalachandranK.BalamuruganM.PrakasiO. G. (2020). Survey on Attribute-based Encryption in Cloud Computing. International Journal of Network Security, 22(5), 863–868. 22   10.69888/FTSCL.2024.000241   10.31149/ijefsd.v6i1.5172   10.2139/ssrn.3606261   10.1007/978-981-15-4739-3_92   10.1109/TVT.2020.3027568   10.1109/JIOT.2021.3055541   10.23919/JCC.2021.03.009   10.1109/TMC.2020.2970705   Defend and Secure: A Strategic and Implementation Framework for Robust Data Breach Prevention. K. D.Jasper 2024 17 1 AVE Trends In Intelligent Computing Systems JasperK. D.JaishnavM. N.ChowdhuryM. F.BadhanR.SivakaniR. (2024). Defend and Secure: A Strategic and Implementation Framework for Robust Data Breach Prevention.AVE Trends In Intelligent Computing Systems, 1(1), 17–31. 1   Efficient Real-time Tamil Character Recognition via Deep Vision Architecture. J.Jeba 2024 1 1 AVE Trends In Intelligent Computing Systems JebaJ.BoseS. R.ReginR.SudhanM. B.Suman RajestS.BabuP. R. (2024). Efficient Real-time Tamil Character Recognition via Deep Vision Architecture.AVE Trends In Intelligent Computing Systems, 1(1), 1–16. 1   10.69888/FTSCL.2024.000181   10.1109/ACCESS.2021.3104899   10.3390/s20174720   10.1109/I-SMAC49090.2020.9243532 Narezal, K., & Kalmani, V. (2020). “Study of lightweight ABE for cloud based IoT”, In 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 134-137). IEEE, Palladam, India.   A Survey on Security Issues in Mobile Cloud Computing (MCC P. V.Naveen 2020 18729 6 Solid State Technology NaveenP. V. (2020). A Survey on Security Issues in Mobile Cloud Computing (MCC. Solid State Technology, 63(6), 18729–18745. 63   10.4018/979-8-3693-0502-7   10.69888/FTSCS.2024.000201   10.1109/ACCESS.2021.3067284   10.1109/ICCC49849.2020.9238987   10.1007/s10619-021-07340-3   Development and Testing of Incorporated ASM with MVP Architecture Model for Android Mobile App Development. N.Rajasekaran 2023 65 2 FMDB Transactions on Sustainable Computing Systems RajasekaranN.JagatheesanS. M.KrithikaS.AlbanchezJ. S. (2023). Development and Testing of Incorporated ASM with MVP Architecture Model for Android Mobile App Development.FMDB Transactions on Sustainable Computing Systems, 1(2), 65–76. 1   10.4018/978-1-6684-9189-8   10.4018/978-1-6684-9189-8.ch018 Regin, R., Khanna, A. A., Krishnan, V., Gupta, M., & Bose, R. S., & Rajest, S. S. (2023). Information design and unifying approach for secured data sharing using attribute-based access control mechanisms. In Recent Developments in Machine and Human Intelligence (pp. 256–276). IGI Global, USA.   10.69888/FTSCL.2024.000185   10.1007/978-3-030-79757-7_30   Transforming Medical Education: Multi-Keyword Ranked Search in Cloud Environment. R.Saxena 2023 135 3 FMDB Transactions on Sustainable Computing Systems SaxenaR.SharmaV.SaxenaR. R. (2023). Transforming Medical Education: Multi-Keyword Ranked Search in Cloud Environment.FMDB Transactions on Sustainable Computing Systems, 1(3), 135–146. 1   10.1016/j.jisa.2020.102559   10.69888/FTSCL.2024.000182   10.1016/j.comnet.2021.108196   Cognitive artificial intelligence systems for proactive threat hunting in AI-driven cloud applications. V. R.Vemula 2024 173 3 AVE Trends in Intelligent Computing Systems VemulaV. R. (2024). Cognitive artificial intelligence systems for proactive threat hunting in AI-driven cloud applications.AVE Trends in Intelligent Computing Systems, 1(3), 173–183. 1   10.1155/2020/8861114   10.1109/ACCESS.2020.2975813   Chronostamp: A general-purpose run-time for data-flow computing in a distributed environment. E.Zanardo 2024 106 2 AVE Trends in Intelligent Computing Systems ZanardoE. (2024). Chronostamp: A general-purpose run-time for data-flow computing in a distributed environment.AVE Trends in Intelligent Computing Systems, 1(2), 106–115. 1   10.1155/2021/8513869   Attribute-based Encryption for Cloud Computing Access Control: A survey Y.Zhang 2020 10.1145/3398036 1 4 ACM Computing Surveys ZhangY.DengR. H.XuS.SunJ.LiQ.ZhengD. (2020). Attribute-based Encryption for Cloud Computing Access Control: A survey. ACM Computing Surveys, 53(4), 1–41. 53   10.1007/s12083-020-00918-1
| Item Type: | Book Section | 
|---|---|
| Subjects: | Computer Applications > Cloud Computing | 
| Domains: | Computer Science | 
| Depositing User: | Mr IR Admin | 
| Date Deposited: | 31 Aug 2025 10:59 | 
| Last Modified: | 31 Aug 2025 10:59 | 
| URI: | https://ir.vistas.ac.in/id/eprint/10764 | 



 Dimensions
 Dimensions Dimensions
 Dimensions