Author:
Sireesha A.,Reddy Devarapalli Janardhan,Rao M. Srinivasa
Reference20 articles.
1. Security Challenges for the Public Cloud
2. D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Security and Privacy, 2000. SandP 2000. Proceedings. 2000 IEEE Symposium on, pp. 0–44, 2002.
3. E. J. Goh, “Secure indexes,” Cryptology ePrint Archive, http://eprint.iacr.org/2003/216., 2003.
4. R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: improved definitions and efficient constructions,” in ACM Conference on Computer and Communications Security, pp. 79–88, 2006.
5. Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage