Author:
Kamble Dhanashri,Patel Rajni,Deshmukh Prajakta
Publisher
Springer International Publishing
Reference15 articles.
1. Xue, K., Chen, W., Li, W., Hong, J., & Hong, P. (2018). Combining data owner-side and cloud-side access control for encrypted cloud storage. IEEE Transactions on Information Forensics and Security, 13(8), 2062–2074.
2. Sivasakthi, T., & Prabakaran, D. N. (2014). Applying digital signature with encryption algorithm of user authentication for data security in cloud computing. International Journal of Innovative Research in Computer and Communication Engineering, 2(2), 456–459.
3. Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: State-of-the-art and research challenges. Journal of Internet Services and Applications, 1(1), 7–18.
4. Li, W., Xue, K., Xue, Y., & Hong, J. (2015). TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage. IEEE Transactions on Parallel and Distributed Systems, 27(5), 1484–1496.
5. Ren, K., Wang, C., & Wang, Q. (2012). Security challenges for the public cloud. IEEE Internet Computing, 16(1), 69–73.