Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. Wei Li, KaipingXue, YingjieXue, and Jianan Hong, TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage, IEEE Transactions on parallel and distributed systems, VOL.24, NO. 06, October 2016.
    2. K. Yang, X. Jia, K. Ren, B. Zhang, and R. Xie, DAC-MACS: Effective data access control for multiauthority cloud storage systems, 2013 Proceedings IEEE INFOCOM Year: 2013. OR Jianan Hong; Kaiping Xue; Wei Li Comments on DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems/Security Analysis of Attribute Revocation in
    3. Multiauthority Data Access Control for Cloud Storage Systems IEEE Transactions on Information Forensics and Security, Year: 2015, Volume: 10, Issue: 6
    4. Taeho Jung, Xiang-Yang Li, Zhiguo Wan, and Meng Wan, Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption, IEEE transactions on information forensics and security, VOL. 10, NO. 01, January 2015.
    5. Kan Yang and XiaohuaJia, Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage, IEEE Transactions on parallel and distributed systems, VOL. 25, NO. 07, July 2014.
    6. S. Kamara and K. Lauter, ”Cryptographic cloud storage,” in Proceedings of the 14th Financial Cryptography and Data Security.Springer, 2010, pp. 136- 149. [6] R.Ostrovsky, A. Sahai, and B.Waters, ”Attributebased encryption with nonmonotonic access structures,” in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2014, pp. 195-203.
    7. W. Xia, Y. Wen, C. Heng Foh, D. Niyato, and H. Xie, A survey on software-defined networking, IEEE Communications Surveys and Tutorials, vol. 17, no. 1, pp. 2751, 2015. View at Publisher View at Google Scholar View at Scopus
    8. Hideaki Ishii, Roberto Tempo, and Er-Wei Bai, Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud, IEEE Transac-tions on parallel and distributed systems, VOL. 24, NO. 06, June 2013.
    9. M. Chase and S. Chow, Improving privacy and security in multi authority attribute-based encryption, in Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009, pp. 121130.
    10. Mohamed Nabeel and Elisa Bertino, Fellow, IEEE, PrivacyPreserving Delegated Access Control in Public Clouds, IEEE Transactions on Knowledge and Data Engineering, Vol. 26, Issue 9, pp.2268-2280, 2014
    11. Z. Liu and Z. Cao, ”On efficiently transferring the linear secret sharing scheme matrix in ciphertextpolicy attribute-based encryption,” IACR Cryptology ePrint Archive, vol. 2010, p. 374, 2010.
    12. S. Patil, P. Vhatkar, and J. Gajwani, ”Towards secure and dependable storage services in cloud computing,” International Journal of Innovative Research in Advanced Engineering, vol. 1, no. 9, pp. 57-64, 2014.
    13. N. Attrapadung, B. Libert, and E. Panaeu, ”Expressive key policy attribute based encryption with constant-size ciphertexts,” in Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography. Springer, 2011, pp. 90 108.
    14. Luca Ferretti, Michele Colajanni, and MircoMarchetti, Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, Issue 2, pp.437-446,2014
    15. Open Networking Foundation (ONF),http://https://www.opennetworking.org/

Recent Article