An efficient privacy preserving cryptographic approach in cloud computing
暂无分享,去创建一个
Siddarama R. Patil | Jayashree Agarkhed | R Ashalatha. | Jayashree Agarkhed | S. Patil | ASHALATHA RAMEGOWDA
[1] Min-Shiang Hwang,et al. A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments , 2014, Int. J. Netw. Secur..
[2] Zoe L. Jiang,et al. Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.
[3] Kalyani B. Ghutugade,et al. Privacy preserving auditing for shared data in cloud , 2016, 2016 International Conference on Computing, Analytics and Security Trends (CAST).
[4] Haifeng Li,et al. A New Security Cloud Storage Data Encryption Scheme Based on Identity Proxy Re-encryption , 2017, Int. J. Netw. Secur..
[5] Joseph K. Liu,et al. An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing , 2014, ESORICS.
[6] S. L. Aarthy,et al. Scalable and efficient attribute based encryption scheme for point to multi-point communication in cloud computing , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).
[7] Jian Fang,et al. An Improved Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme , 2015 .
[8] U. Arjun,et al. A short review on data security and privacy issues in cloud computing , 2016, 2016 IEEE International Conference on Current Trends in Advanced Computing (ICCTAC).
[9] Minglu Li,et al. Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing , 2014, Comput. Secur..
[10] Sonali D. Thosar,et al. Data integrity verification privacy preserving approach of cloud using Third Party Auditor and multithreading , 2016, 2016 International Conference on Computing Communication Control and automation (ICCUBEA).
[11] S. Jayashri,et al. Efficient privacy preserving integrity checking model for cloud data storage security , 2017, 2016 Eighth International Conference on Advanced Computing (ICoAC).
[12] S. S. Salokhe,et al. Privacy and Shoulder Surfing Attack Preserving Anonymous Attribute Based Encryption Scheme , 2017 .
[13] Rajkumar Buyya,et al. Ensuring Security and Privacy Preservation for Cloud Data Services , 2016, ACM Comput. Surv..
[14] Cong Wang,et al. Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[15] Arwa Alrawais,et al. An Attribute-Based Encryption Scheme to Secure Fog Communications , 2017, IEEE Access.
[16] Wei Jiang,et al. Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.
[17] Lei Zhang,et al. Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud , 2016, IEEE Transactions on Information Forensics and Security.
[18] Kunihiko Miyazaki,et al. Representative System and Security Message Transmission using Re-encryption Scheme Based on Symmetric-key Cryptography , 2017, J. Inf. Process..
[19] Bo-Suk Yang,et al. Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage , 2020, IEEE Transactions on Emerging Topics in Computing.
[20] B. Balamurugan,et al. Privacy preserving ciphertext policy attribute based encryption scheme with efficient and constant ciphertextsize , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).
[21] Fagen Li,et al. A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment , 2017, Int. J. Netw. Secur..
[22] Sangita Chaudhari,et al. Third Party Public Auditing Scheme for Cloud Storage , 2016 .
[23] Sitendra Tamrakar,et al. An effective access from cloud data using attribute based encryption , 2015, 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE).
[24] Weixin Xie,et al. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[25] Yanqin Zhu,et al. Privacy-preserving online/offline and outsourced multi-authority attribute-based encryption , 2017, 2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS).
[26] Sashank Dara. Cryptography Challenges for Computational Privacyin Public Clouds , 2013, 2013 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).
[27] Duncan S. Wong,et al. A ciphertext‐policy attribute‐based proxy re‐encryption scheme for data sharing in public clouds , 2015, Concurr. Comput. Pract. Exp..
[28] Rajkumar Buyya,et al. An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing , 2016, J. Netw. Comput. Appl..