An efficient and secure data sharing framework using homomorphic encryption in the cloud
暂无分享,去创建一个
Sanjay Kumar Madria | Gerry Howser | Bharath K. Samanthula | Yousef Elmehdwi | S. Madria | Gerry Howser | B. Samanthula | Yousef Elmehdwi
[1] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[2] Ashutosh Saxena,et al. A cryptography based privacy preserving solution to mine cloud data , 2010, Bangalore Compute Conf..
[3] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[4] Sheng Zhong,et al. Privacy-Preserving Queries on Encrypted Data , 2006, ESORICS.
[5] Xu An Wang,et al. A New Identity Based Proxy Re-Encryption Scheme , 2010, 2010 International Conference on Biomedical Engineering and Computer Science.
[6] Bhavani M. Thuraisingham,et al. Secure data storage and retrieval in the cloud , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).
[7] Yanjiang Yang,et al. A Generic Scheme for Secure Data Sharing in Cloud , 2011, 2011 40th International Conference on Parallel Processing Workshops.
[8] Traian Andrei. Cloud Computing Challenges and Related Security Issues , 2009 .
[9] Doerte K. Rappe. Homomorphic cryptosystems and their applications , 2005, IACR Cryptol. ePrint Arch..
[10] Balachandra Reddy Kandukuri,et al. Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.
[11] Roberto Di Pietro,et al. Transparent security for cloud , 2010, SAC '10.
[12] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[13] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[14] Sudhir N. Dhage,et al. Intrusion detection system in cloud computing environment , 2011, ICWET.
[15] Matthew Metheny,et al. Security and Privacy in Public Cloud Computing , 2013, CloudCom 2013.
[16] Gurdev Singh,et al. SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS , 2011 .
[17] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[18] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[19] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[20] Susan Hohenberger,et al. Key-Private Proxy Re-encryption , 2009, CT-RSA.
[21] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[22] Ivan Stojmenovic,et al. DACC: Distributed Access Control in Clouds , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[23] Kamal Dahbur,et al. Security Issues in Cloud Computing: A Survey of Risks, Threats and Vulnerabilities , 2011, Int. J. Cloud Appl. Comput..
[24] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[25] Dan Lin,et al. Data protection models for service provisioning in the cloud , 2010, SACMAT '10.
[26] Chris Clifton,et al. Similar Document Detection with Limited Information Disclosure , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[27] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.