1 |
Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, and Geyong Min, " Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage," IEEE Trans.Inf. Forensics Secur, Vol. 12, pp.767-778, 2017.
DOI
|
2 |
Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, and Rajkumar Buyya "Ensuring security and privacy preservation for cloud data services," ACM Comput. Surv. (CSUR), Vol. 49, No.1, pp.13, 2016.
|
3 |
Smaranika Dasgupta, and S.K.Pa, "Design of a polynomial ring based symmetric homomorphic encryption scheme," Perspect. Sci, Vol. 8, pp.692-695, 2016.
DOI
|
4 |
Khalid El, Makkaoui Abderrahim, Beni-Hssane, Abdellah Ezzati, Anas El-Ansari, "Fast cloud-RSA scheme for promoting data confidentiality in the cloud computing," Procedia Comput.Sci., Vol.113, pp.33-40, 2017.
DOI
|
5 |
Farhad Farokhi, Iman Shames, and Nathan Batterham, "Secure and private cloud-based control using semi-homomorphic encryption," IFAC-Papers Online, Vol. 49, No.22, pp.163-168, 2016.
|
6 |
Xuyun Zhang, Wanchun Dou, Jian Pei, Surya Nepal, Chi Yang, Chang Liu, and Jinjun Chen, "Proximity-aware local-recoding anonymization with map reduce for scalable big data privacy preservation in cloud," IEEE Trans. Comput, Vol. 64, pp. 2293-2307, 2015.
DOI
|
7 |
Chia-Mu Yu ,Chi-Yuan Chen , and Han-Chieh Chao, "Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data," IEEE Systems Journal, Vol.11, No.2, pp.385-394, 2017.
DOI
|
8 |
Bing Wang, Shucheng Yu, Wenjing Lou, and Y. Thomas Hou, "Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud," in Proc. of INFOCOM, 2014 Proceedings IEEE, pp. 2112-2120, 2014.
|
9 |
Kai Fan, Qiong Tian, Junxiong Wang, Hui Li, Yintang Yang, "Privacy Protection Based Access Control Scheme in Cloud-Based Services," IEEE 2017, Vol.14, No. 1, pp.61-71, 2017.
|
10 |
Khalil Hariss, Hassan Noura, and Abed Ellatif Samhat, "Fully enhanced homomorphic encryption algorithm of MORE approach for real world applications," J. Inf.Secur. Appl, Vol.34, No.2, pp. 233-242, 2017.
|
11 |
Kadam Prasad, Jadhav Poonam, Khupase Gauri, N.C.Thoutan, "Data sharing security and privacy preservation in cloud computing," in Proc. of Green Computing and Internet of Things(ICGCIoT), 2015 International Conference, pp. 1070-1075, 2015.
|
12 |
Zhang .X, Chang Liu, Surya Nepal, Chi Yang, and Jinjun Chen, "Privacy preservation over big data in cloud systems," in Proc. of Security, Privacy and Trust in Cloud Systems, Springer, pp. 239-257, 2014.
|
13 |
Ryan Hayward and Chia-Chu Chiang, "Parallelizing fully homomorphic encryption for a cloud environment," J. Appl. Res. Technol, Vol. 13, No.2, pp.245-252, 2015.
DOI
|
14 |
J. Suganthi, J. Ananthi J, S. Archana, "Privacy preservation and public auditing for cloud data using ASS in multi-cloud," in Proc. of Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015 International Conference, pp. 1-6, 2015.
|
15 |
Wei Wang, Lei chen, and Qian Zhang, "Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation," Computer Networks, Vol.88, pp.136-148, 2015.
DOI
|
16 |
Frank Li, Richard Shin, and Vern Paxson, "Exploring privacy preservation in outsourced k-nearest neighbors with multiple data owners," in Proc. of the 2015 ACM Workshop on Cloud Computing Security Workshop, pp. 53-64, 2015.
|
17 |
Hong Liu, Huansheng Ning , Qingxu Xiong , and Laurence T. Yang, "Shared authority based privacy-preserving authentication protocol in cloud computing," IEEE Trans. Parallel Distrib. Syst, Vol.26, No.1, pp.241-251, 2015.
DOI
|
18 |
Qinghua Shen, Xiaohui Liang, Xuemin Shen, Xiaodong Lin, and Henry Y. Luo, "Exploiting geo-distributed clouds for a e-health monitoring system with minimum service delay and privacy preservation," IEEE J. Biomed. Health Inform, Vol.18, No.2, pp. 430-439, 2014.
DOI
|
19 |
Manish M.Potey, A.Dhote, Deepak H, and Sharma, "Homomorphic encryption for security of cloud data," Procedia Comput. Sci, Vol.79, pp.175-181, 2016.
DOI
|
20 |
Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst, Vol.25, pp.222-233, 2014.
DOI
|
21 |
Kaaniche. N, Laurent. M, "Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms," Comput. Commun., Vol. 111, pp.120-141, 2017.
DOI
|