{"created":"2020-09-01T13:11:00.500285+00:00","id":3589,"links":{},"metadata":{"_buckets":{"deposit":"163b600f-407b-4d7c-9902-6e3cb4084d51"},"_deposit":{"id":"3589","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3589"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3589","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"A privacy Control System in Cloud Computing Environment using Identity based Encryption and Signature (IBE and IBS)","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Privacy protection play a vital role to build up the cloud computing environment. This system intends to implement secure cloud privacy system using Identity based Encryption (IBE) and Identity based Signature (IBS) algorithms, that do not have to generate the keys itself. IBE and IBS systems allow any party such as cloud provider, cloud user and trusted third party to generate a public key from a known unique identity value. Private Key Generator (PKG) generates the corresponding private keys. This system generates public key and private key of cloud service provider (CSP) and cloud users by PKG using IBE and IBS for each group. When data sent from server to client, first data is encrypted using public key of user. Data is signed using the private key of server for the authentication of sender. This system implements a cloud server and cloud clients where cloud server stores client data in its data center."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-25"}],"displaytype":"preview","filename":"A privacy Control System in Cloud Computing Environment using Identity based Encryption and Signature.pdf","filesize":[{"value":"6 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3589/files/A privacy Control System in Cloud Computing Environment using Identity based Encryption and Signature.pdf"},"version_id":"725e3ede-0b6d-4593-bfb2-075a319bda97"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Sixth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Kyaw, Cho Cho"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2011-12-29"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1325"},"item_title":"A privacy Control System in Cloud Computing Environment using Identity based Encryption and Signature (IBE and IBS)","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-25","publish_status":"0","recid":"3589","relation_version_is_last":true,"title":["A privacy Control System in Cloud Computing Environment using Identity based Encryption and Signature (IBE and IBS)"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-03-24T23:15:56.383609+00:00"}