Secure and Efficient Enhanced Sharing of Data Over Cloud Using Attribute Based Encryption with Hash Functions
暂无分享,去创建一个
[1] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[2] Haibo Chen,et al. Security-Preserving Live Migration of Virtual Machines in the Cloud , 2012, Journal of Network and Systems Management.
[3] Xiaojiang Du,et al. Prometheus: Privacy-aware data retrieval on hybrid cloud , 2013, 2013 Proceedings IEEE INFOCOM.
[4] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[5] Jian Shen,et al. Secure Data Access and Sharing Scheme for Cloud Storage , 2017, Wirel. Pers. Commun..
[6] Mário M. Freire,et al. Security issues in cloud environments: a survey , 2014, International Journal of Information Security.
[7] M. Lilly Florence,et al. Enhanced secure sharing of PHR’s in cloud using user usage based attribute based encryption and signature with keyword search , 2017, Cluster Computing.
[8] Feipei Lai,et al. Confidentiality Protection of Digital Health Records in Cloud Computing , 2016, Journal of Medical Systems.
[9] Ehud Gudes,et al. Security and privacy aspects in MapReduce on clouds: A survey , 2016, Comput. Sci. Rev..
[10] Radu Sion. Secure Data Outsourcing , 2007, VLDB.
[11] Albert Y. Zomaya,et al. Trends and challenges in cloud datacenters , 2014, IEEE Cloud Computing.
[12] Wei Xie,et al. Security and Privacy in Cloud Computing: A Survey , 2010, 2010 Sixth International Conference on Semantics, Knowledge and Grids.
[13] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[14] Murat Kantarcioglu,et al. SEMROD: Secure and Efficient MapReduce Over HybriD Clouds , 2015, SIGMOD Conference.
[15] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[16] Ying Yin,et al. Privacy protection and integrity verification of aggregate queries in cloud computing , 2019, Cluster Computing.
[17] Nik Bessis,et al. CS-PSO: chaotic particle swarm optimization algorithm for solving combinatorial optimization problems , 2016, Soft Computing.
[18] Ilaria Matteucci,et al. Towards safer information sharing in the cloud , 2014, International Journal of Information Security.
[19] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[20] Jérôme Darmont,et al. Secret sharing for cloud data security: a survey , 2017, The VLDB Journal.
[21] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[22] Jenq-Shiou Leu,et al. Enhancing security and privacy of images on cloud by histogram shifting and secret sharing , 2017, Multimedia Tools and Applications.
[23] Daan Broeder,et al. A data infrastructure reference model with applications: towards realization of a ScienceTube vision with a data replication service , 2013, Journal of Internet Services and Applications.
[24] Le Gruenwald,et al. A survey of data replication techniques for mobile ad hoc network databases , 2008, The VLDB Journal.
[25] Mihir Bellare,et al. Incremental Cryptography: The Case of Hashing and Signing , 1994, CRYPTO.
[26] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[27] Yong Wang,et al. A new usage control protocol for data protection of cloud environment , 2016, EURASIP J. Inf. Secur..
[28] Minhaj Ahmad Khan,et al. A survey of security issues for cloud computing , 2016, J. Netw. Comput. Appl..
[29] Eduardo B. Fernández,et al. An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.
[30] Wenfen Liu,et al. Forward and backward secure fuzzy encryption for data sharing in cloud computing , 2019, Soft Comput..
[31] Divesh Srivastava,et al. Anonymized Data: Generation, models, usage , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).
[32] Roland H. C. Yap,et al. Tagged-MapReduce: A General Framework for Secure Computing with Mixed-Sensitivity Data on Hybrid Clouds , 2014, 2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.
[33] Qinglin Zhao,et al. Support for spot virtual machine purchasing simulation , 2018, Cluster Computing.