Effective Data Sharing in an Edge-Cloud Model: Security Challenges and Solutions
The proposed protocol offers privacy-preserving authentication across several cloud platforms, flexible key management for consumer data protection, and effective user revocation. Performance evaluation demonstrates that the proposed framework supports low latency, safe unified remote access, and da...
Saved in:
Published in | Computer (Long Beach, Calif.) Vol. 57; no. 7; pp. 53 - 65 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.07.2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The proposed protocol offers privacy-preserving authentication across several cloud platforms, flexible key management for consumer data protection, and effective user revocation. Performance evaluation demonstrates that the proposed framework supports low latency, safe unified remote access, and data privacy in the contemporary edge-enabled environment. |
---|---|
ISSN: | 0018-9162 1558-0814 |
DOI: | 10.1109/MC.2024.3367590 |