Efficient Semantic Interrogation Scheme over Cryptographic Data in Cloud
暂无分享,去创建一个
S. Malathy | K. Vanitha | C. N. Vanitha | M. Mohamed Musthafa | K. Vanitha | S. Malathy | C. Vanitha | M. Mohamed Musthafa
[1] Kunal V. Raipurkar,et al. Improve data security in cloud environment by using LDAP and two way encryption algorithm , 2016, 2016 Symposium on Colossal Data Analysis and Networking (CDAN).
[2] Shangping Wang,et al. A Keyword-Searchable ABE Scheme From Lattice in Cloud Storage Environment , 2019, IEEE Access.
[3] Jianfeng Ma,et al. Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing , 2020, IEEE Transactions on Services Computing.
[4] P. Pandiaraja,et al. Efficient Multi-keyword Search over Encrypted Data in Untrusted Cloud Environment , 2017, 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM).
[5] Saiful Islam,et al. A Simple and Secured Cryptography System of Cloud Computing , 2019, 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE).
[6] K. Vanitha,et al. Preventing malicious packet dropping nodes in MANET using IFHM based SAODV routing protocol , 2018, Cluster Computing.
[7] Mohammad Ali Akhaee,et al. Secure and privacy preserving keyword searching cryptography , 2014, 2014 11th International ISC Conference on Information Security and Cryptology.
[8] Chang Xue-Zhou,et al. Network Data Encryption Strategy for Cloud Computing , 2015, 2015 Seventh International Conference on Measuring Technology and Mechatronics Automation.
[9] Xingming Sun,et al. Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..
[10] Ming-Der Shieh,et al. A Security Proxy to Cloud Storage Backends Based on an Efficient Wildcard Searchable Encryption , 2018, 2018 IEEE 8th International Symposium on Cloud and Service Computing (SC2).
[11] D. Kishore Babu,et al. PROTECTED STEADFAST DEDUPLICATION IN CROSSBREED CLOUD TECHNIQUE , 2018, 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on.
[12] Vishal V. Mahale,et al. Secure Data sharing in Distributed Cloud Environment , 2018, 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on.
[13] Sanjay Jadhav,et al. Confidentiality-conserving Multi-keyword Ranked Search Above Encrypted Cloud Data , 2016 .
[14] Muttukrishnan Rajarajan,et al. R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data , 2019, IEEE Access.
[15] Amit Chaturvedi,et al. A review of efficient data utilization schemes in cloud computing , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).
[16] Xiangyang Zhu,et al. A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data , 2017, 2017 3rd International Conference on Big Data Computing and Communications (BIGCOM).
[17] Ling Liu,et al. Searchable Encryption for Healthcare Clouds: A Survey , 2018, IEEE Transactions on Services Computing.
[18] Yuansong Qiao,et al. Chaotic Searchable Encryption for Mobile Cloud Storage , 2018, IEEE Transactions on Cloud Computing.
[19] Aruna Guruvaya Mogarala,et al. Security and Privacy Designs Based Data Encryption in Cloud Storage and Challenges: A Review , 2018, 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT).
[20] P. M. Chouragade,et al. Systematic Hierarchy Based Secured Access Control in Cloud Storage , 2017, 2017 International Conference on Recent Trends in Electrical, Electronics and Computing Technologies (ICRTEECT).