요약
ABSTRACT
1. Introduction
2. Related Work
2.1 Security in MCC
2.2 Identity-based cryptography
3. Secure data processing in MCC
3.1 Hierarchical ID-based encryption forMCC
3.2 Id-based user authentication scheme in MCC
4. Conclusions
References