Secured Sharing of Data in Cloud via Dual Authentication, Dynamic Unidirectional PRE, and CPABE
暂无分享,去创建一个
Amit Agarwal | Ajay Rana | Neha Agarwal | J. P. Pandey | A. Agarwal | A. Rana | Neha Agarwal | J. Pandey
[1] Hai Jin,et al. Fine-grained and heterogeneous proxy re-encryption for secure cloud storage , 2014 .
[2] Jie Wu,et al. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers , 2011, Comput. Secur..
[3] Zhen Liu,et al. White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures , 2013, IEEE Transactions on Information Forensics and Security.
[4] Robert H. Deng,et al. Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings , 2010, Inf. Sci..
[5] Wen-Guey Tzeng,et al. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding , 2012, IEEE Transactions on Parallel and Distributed Systems.
[6] Javier López,et al. On the application of generic CCA-secure transformations to proxy re-encryption , 2016, Secur. Commun. Networks.
[7] Sanjay Kumar Madria,et al. A secure data sharing and query processing framework via federation of cloud computing , 2015, Inf. Syst..
[8] Namje Park,et al. Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment , 2011 .
[9] Laid Kahloul,et al. Network security: distributed intrusion detection system using mobile agent technology , 2016 .
[10] Xiaolei Dong,et al. Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..
[11] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[12] Pil Joong Lee,et al. Comments on “Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption” , 2013, IEEE Transactions on Information Theory.
[13] Kefei Chen,et al. Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing , 2014 .
[14] Ahmed Patel,et al. An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..
[15] Wen-Guey Tzeng,et al. Identity-Based Proxy Re-encryption Without Random Oracles , 2007, ISC.
[16] Susan Hohenberger,et al. Key-Private Proxy Re-encryption , 2009, CT-RSA.
[17] V VasilakosAthanasios,et al. Security in cloud computing , 2015 .
[18] Wenhong Wei,et al. A DDOS defence scheme based on two-stage traffic flow control , 2014, Int. J. Commun. Networks Distributed Syst..
[19] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[20] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[21] Hui Li,et al. Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud , 2015, IEEE Transactions on Services Computing.
[22] Kire Jakimoski. Security Techniques for Data Protection in Cloud Computing , 2016 .
[23] N. Jeyanthi,et al. Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP , 2013, Int. J. Commun. Networks Distributed Syst..
[24] Yonggang Wen,et al. Towards end-to-end secure content storage and delivery with public cloud , 2012, CODASPY '12.
[25] Yanjiang Yang,et al. A Generic Scheme for Secure Data Sharing in Cloud , 2011, 2011 40th International Conference on Parallel Processing Workshops.
[26] Joseph K. Liu,et al. A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing , 2015, Future Gener. Comput. Syst..
[27] DongHai,et al. Cloud service selection , 2014 .
[28] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[29] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[30] Kim-Kwang Raymond Choo,et al. Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment , 2017, Comput. Stand. Interfaces.
[31] Nishant Doshi,et al. Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption , 2014, Secur. Commun. Networks.
[32] Bernd Zwattendorfer,et al. CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).
[33] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[34] Eric Pardede,et al. A new model to ensure security in cloud computing services , 2012, J. Serv. Sci. Res..
[35] Nader Mbarek,et al. A new proposed cloud computing based architecture for space ground data systems , 2018, Int. J. Commun. Networks Distributed Syst..
[36] Jin Li,et al. A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.
[37] Jin Li,et al. Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2014, ProvSec.
[38] Elizabeth Chang,et al. Cloud service selection: State-of-the-art and future research directions , 2014, J. Netw. Comput. Appl..
[39] Cong Wang,et al. Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.
[40] Xiaohua Jia,et al. Data storage auditing service in cloud computing: challenges, methods and opportunities , 2011, World Wide Web.
[41] Sandeep K. Sood,et al. A combined approach to ensure data security in cloud computing , 2012, J. Netw. Comput. Appl..
[42] Yang Lu,et al. A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds , 2016, Future Gener. Comput. Syst..
[43] Martin Gilje Jaatun,et al. Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..
[44] Okba Kazar,et al. SaaS-DCS: software-as-a-service discovery and composition system-based existence degree , 2015, Int. J. Commun. Networks Distributed Syst..
[45] Matthew Green,et al. Identity-Based Proxy Re-encryption , 2007, ACNS.
[46] Stephen S. Yau,et al. Dynamic Audit Services for Outsourced Storages in Clouds , 2013, IEEE Transactions on Services Computing.
[47] Sunilkumar S. Manvi,et al. Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey , 2014, J. Netw. Comput. Appl..
[48] Junbeom Hur,et al. Improving Security and Efficiency in Attribute-Based Data Sharing , 2013, IEEE Transactions on Knowledge and Data Engineering.
[49] Samiran Chattopadhyay,et al. A cost-efficient one time password-based authentication in cloud environment using equal length cellular automata , 2017 .
[50] Sanjay Kumar,et al. Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN , 2016, Int. J. Commun. Networks Distributed Syst..
[51] Feng-Hao Liu,et al. Various Proxy Re-Encryption Schemes from Lattices , 2016, IACR Cryptol. ePrint Arch..
[52] Chris Peikert,et al. Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller , 2012, IACR Cryptol. ePrint Arch..
[53] Benoît Libert,et al. Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption , 2008, IEEE Transactions on Information Theory.
[54] Sudip Misra,et al. Cloud Computing Applications for Smart Grid: A Survey , 2015, IEEE Transactions on Parallel and Distributed Systems.
[55] Sugata Sanyal,et al. A framework for phishing attack identification using rough set and formal concept analysis , 2017, Int. J. Commun. Networks Distributed Syst..
[56] Piotr K. Tysowski,et al. Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds , 2013, IEEE Transactions on Cloud Computing.
[57] Fuchun Guo,et al. CP-ABE With Constant-Size Keys for Lightweight Devices , 2014, IEEE Transactions on Information Forensics and Security.
[58] S. L. Aarthy,et al. Scalable and efficient attribute based encryption scheme for point to multi-point communication in cloud computing , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).
[59] Jie Wu,et al. Time-based proxy re-encryption scheme for secure data sharing in a cloud environment , 2014, Inf. Sci..