Volume 51 | Number 2 | Year 2017 | Article Id. IJMTT-V51P514 | DOI : https://doi.org/10.14445/22315373/IJMTT-V51P514
S Kranthi Kumar, Dr. P. V Siva Kumar, M Venkata Krishna Rao, "A Comparative Study of different attribute based encyrption models for cloud data security," International Journal of Mathematics Trends and Technology (IJMTT), vol. 51, no. 2, pp. 113-118, 2017. Crossref, https://doi.org/10.14445/22315373/IJMTT-V51P514
[1] S. Zhu, Y. Han and Y. Wei, “Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption”, “International Conference on Intelligent Networking and Collaborative Systems”, pp. 257-261, 2015.
[2] G. S. Tamizharasi, B. Balamurugan and R. Manjula, “Attribute Based Encryption with Fine-grained Access Provision in Cloud Computing “, “Proceedings of the International Conference on Informatics and Analytics. ACM”, 2016.
[3] B. Chandrasekaran and R. Balakrishnan, “Attribute Based Encryption Using Quadratic Residue for the Big Data in Cloud Environment”, “Proceedings of the International Conference on Informatics and Analytics. ACM”, 2016.
[4] A. Kaci and T. Bouabana-Tebibel, “Access Control Reinforcement over Searchable Encryption “, “IEEE IRI 2014, August 13-15, 2014, San Francisco, California, USA”, pp.130- 137, 2014.
[5] J. Li, Y. Shi and Y. Zhang, “Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage”, “International Journal Of Communication Systems International Joirnal of Communication System,2015.
[6] L. Li, X. Chen and H. Jiang, “P-CP-ABE: Parallelizing Ciphertext-Policy Attribute-Based Encryption for Clouds “, “17th IEEE/ACIS International Conference on. IEEE”, pp.1-6, 2016.
[7] S. Wang, J. Zhou, J. K. Liu, J. Yu, J. Chen and W. Xie, “An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing”, “IEEE Transactions on Information Forensics and Security 11.6”, pp.1265-1277, 2016.
[8] L. Warren and H. Chi, “Securing EHRs via CPMA Attribute- Based Encryption on Cloud Systems “, “Proceedings of the 2014 ACM Southeast Regional Conference. ACM”, 2014.
[9] F. Xhafa, J. Li, G. Zhao, J. Li, X. Chen and D. S. Wong, “Designing cloud-based electronic health record system with attribute-based encryption”, “Multimedia Tools and Applications 74.10 (2015)”, pp. 3441-3458, 2014.
[10] H. Yan, X. Li and J. Du, “Secure Personal Health Record System with Attribute-Based Encryption in Cloud Computing”, “Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing”, pp.329-332, 2014.
[11] Y. Zhang, D. Zheng, Q. Li, J. Li and H. Li, “Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing”, “Security and Communication Networks 9.16 ”, pp. 3688-3702, 2016.
[12] L. Zhenpeng, Z. Xianchao and Z. Shouhua, “Multi authority attribute based encryption with attribute revocation”, “IEEE 17th International Conference on Computational Science and Engineering”, pp. 1872-1876, 2014.