Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] C.-K. Chu, W.-T.Zhu, J. Han, J.-K. Liu, J. Xu, and J. Zhou, “Security concerns in popular cloud storage services,†IEEE Pervasive Comput., vol. 12, no. 4, pp. 50–57, Oct./Dec. 2013. [2] T. Jiang, X. Chen, J. Li, D. S. Wong, J. Ma, and J. Liu, “TIMER: Secure and reliable cloud storage against data re-outsourcing,†in Proc. 10th Int. Conf. Inf. Secure. Pract.Exper., vol. 8434. May 2014, pp. 346–358. [3] K. Liang, J. K. Liu, D. S. Wong, and W. Susilo, “An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing,†in Proc. 19th Eur. Symp. Res. Comput. Secur., vol. 8712. Sep. 2014, pp. 257–272. [4] T. H. Yuen, Y. Zhang, S. M. Yiu, and J. K. Liu, “Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks,†in Proc. 19th Eur. Symp. Res. Comput. Secur., vol. 8712. Sep. 2014, pp. 130–147. [5] K. Liang et al., “A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing,†IEEE Trans. Inf. Forensics Security, vol. 9, no. 10, pp. 1667–1680, Oct. 2014. [6] T. H. Yuen, J. K. Liu, M. H. Au, X. Huang, W. Susilo, and J. Zhou, “k-times attribute-based anonymous access control for cloud computing,†IEEE Trans. Comput., vol. 64, no. 9, pp. 2595–2608, Sep. 2015. [7] J. K. Liu, M. H. Au, X. Huang, R. Lu, and J. Li, “Fine-grained two factor access control for Web-based cloud computing services,†IEEE Trans. Inf. Forensics Security, vol. 11, no. 3, pp. 484–497, Mar. 2016. [8] A. Sahai and B. Waters, “Fuzzy identity-based encryption,†in Advances in Cryptology. Berlin, Germany: Springer, May 2005, pp. 457–473. [9] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,†in Proc. 13th ACM Conf. Comput. Commun.Secur., Oct. 2006, pp. 89–98. [10] W. Zhu, J. Yu, T. Wang, P. Zhang, and W. Xie, “Efficient attribute-based encryption from R-LWE,†Chin. J. Electron., vol. 23, no. 4, pp. 778–782, Oct. 2014. [11] J. Bethencourt, A. Sahai, and B. Waters, “Cipher text-policy attribute based encryption,†in Proc. IEEE Symp.Secur. Privacy, May 2007, pp. 321–334. [12] L. Cheung and C. Newport, “Provably secure ciphertext policy ABE,†in Proc. 14th ACM Conf. Comput. Commun.Secur., Oct. 2007, pp. 456–465. [13] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated ciphertext-policy attribute-based encryption and its application,†in Proc. 10th Int. Workshop Inf. Secur. Appl., Aug. 2009, pp. 309–323. [14] X. Xie, H. Ma, J. Li, and X. Chen, “An efficient ciphertext-policy attribute-based access control towards revocation in cloud computing,†J. Universal Comput. Sci., vol. 19, no. 16, pp. 2349–2367, Oct. 2013. [15] F. Guo, Y. Mu, W. Susilo, D. S. Wong, and V. Varadharajan, “CP-ABE with constant-size keys for lightweight devices,†IEEE Trans. Inf. Forensics Security, vol. 9, no. 5, pp. 763–771, May 2014. [16] A. Balu and K. Kuppusamy, “An expressive and provably secure ciphertext-policy attribute-based encryption,†Inf. Sci., vol. 276, pp. 354–362, Aug. 2014. [17] X. Liu, J. Ma, J. Xiong, and G. Liu, “Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption data,†Int. J. Netw.Secur., vol. 16, no. 6, pp. 437–443, Nov. 2014. [18] Y. Chen, Z. L. Jiang, S. M. Yiu, J. K. Liu, M. H. Au, and X. Wang, “Fully secure ciphertext-policy attribute based encryption with security mediator,†in Proc. 16th Int. Conf. Inf. Commun. Secur., vol. 8958. Dec. 2014, pp. 274–289. [19] Y. Yang, J. K. Liu, K. Liang, K.-K. R. Choo, and J. Zhou, “Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data,†in Proc. 20th Eur. Symp. Res. Comput. Secur.(ESORICS), vol. 9327. Sep. 2015, pp. 146–166. [20] J. Liu, X. Huang, and J. K. Liu, “Secure sharing of personal health records in cloud computing: Ciphertext-policy attribute-based signcryption,†Future Generat. Comput. Syst., vol. 52, pp. 67–76, Nov. 2015. [21] K. Liang et al., “A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing,†Future Generat. Comput. Syst., vol. 52, pp. 95–108, Nov. 2015. [22] C.-I. Fan, V. S.-M.Huang, and H.-M. Ruan, “Arbitrary-state attributebased encryption with dynamic membership,†IEEE Trans. Comput., vol. 63, no. 8, pp. 1951–1961, Aug. 2014. [23] H. Zheng, Q. Yuan, and J. Chen, “A framework for protecting personal information and privacy,†Secur.Commun.Netw., vol. 8, no. 16, pp. 2867–2874, Nov. 2015. [24] F. Xhafa, J. Wang, X. Chen, J. K. Liu, J. Li, and P. Krause, “An efficient PHR service system supporting fuzzy keyword search and fine-grained access control,†Soft Comput., vol. 18, no. 9, pp. 1795–1802, Sep. 2014. [25] S. Wang, J. Yu, P. Zhang, and P. Wang, “A novel file hierarchy access control scheme using attribute-based encryption,†Appl. Mech. Mater., vols. 701–702, pp. 911–918, Jan. 2015. [26] A.Shekinah Prema Sunaina,†Study on Competent and Revocable Data Access Control Scheme for Multi-Authority Cloud Storage Systems.†International Journal of Computer Engineering in Research Trends., vol.2, no.5, pp. 365-368, 2015. [27] R.Srinivas and Ajay Kumar,†Attribute-Based Encryption for Reliable and Secure Sharing of PHR in Cloud Computing.†International Journal of Computer Engineering in Research Trends., vol.2, no.10, pp. 679-682, 2015. [28] NUTAKKI PRASAD and K.KIRAN KUMAR,†A Dynamic Secure Multi Owner Data Sharing Scheme Over Cloud Computing.†International Journal of Computer Engineering in Research Trends., vol.2, no.10, pp. 889-895, 2015. [29] S.L.SOWJANYA, D.RAVIKIRAN,†Secure Data Sharing for Dynamic Groups in the Public Cloud.†International Journal of Computer Engineering in Research Trends., vol.1, no.6, pp. 428-435, 2014. [30] Allam Jyothi,G.Somasekhar and Dr S.Prem Kumar,†A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.†International Journal of Computer Engineering in Research Trends., vol.2, no.8, pp. 475-480, 2015.
![]() | V4I1002.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|