References
- P. Mell and T. Grance, "The NIST definition of cloud computing," National Institute of Standards and Technology Gaithersburg, 2011.
- Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, "Enabling personalized search over encrypted outsourced data with efficiency improvement," IEEE Transactions on Parallel & Distributed Systems, vol. 27, no. 9, pp. 2546-2559, 2016. https://doi.org/10.1109/TPDS.2015.2506573
- Z. Fu, X. Sun, S. Ji, and G. Xie, "Towards efficient content-aware search over encrypted outsourced data in cloud," in in Proceedings of 2016 IEEE Conference on Computer Communications (INFOCOM 2016). IEEE, 2016, pp. 1-9.
- K. Xue and P. Hong, "A dynamic secure group sharing framework in public cloud computing," IEEE Transactions on Cloud Computing, vol. 2, no. 4, pp. 459-470, 2014. https://doi.org/10.1109/TCC.2014.2366152
- Y. Wu, Z. Wei, and H. Deng, "Attribute-based access to scalable media in cloud-assisted content sharing," IEEE Transactions on Multimedia, vol. 15, no. 4, pp. 778-788, 2013. https://doi.org/10.1109/TMM.2013.2238910
- J. Hur, "Improving security and efficiency in attribute based data sharing," IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 10, pp. 2271-2282, 2013. https://doi.org/10.1109/TKDE.2011.78
- J. Hur and D. K. Noh, "Attribute-based access control with efficient revocation in data outsourcing systems," IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214-1221, 2011. https://doi.org/10.1109/TPDS.2010.203
- J. Chen and H. Ma, "Efficient decentralized attribute based access control for cloud storage with user revocation," in Proceedings of 2014 IEEE International Conference on Communications (ICC 2014). IEEE, 2014, pp. 3782-3787.
- M. Chase and S. S. Chow, "Improving privacy and security in multi-authority attribute-based encryption," in Proceedings of the 16th ACM conference on Computer and Communications Security (CCS 2009). ACM, 2009, pp. 121-130.
- W. Li, K. Xue, Y. Xue, and J. Hong, "TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage," IEEE Transactions on Parallel & Distributed Systems, vol. 27, no. 5, pp. 1484-1496, 2016. https://doi.org/10.1109/TPDS.2015.2448095
- V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute based encryption for fine-grained access control of encrypted data," in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006). ACM, 2006, pp. 89-98.
- J. Bethencourt, A. Sahai, and B. Waters, "Ciphertextpolicy attribute-based encryption," in Proceedings of IEEE Symposium on Security and Privacy (S&P 2007). IEEE, 2007, pp. 321-334.
- J. Shao, R. Lu, and X. Lin, "Fine-grained data sharing in cloud computing for mobile devices," in Proceedings of 2015 IEEE Conference on Computer Communications (INFOCOM 2015). IEEE, 2015, pp. 2677-2685.
- J. Li, X. Huang, J. Li, X. Chen, and Y. Xiang, "Securely outsourcing attribute-based encryption with checkability," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 8, pp. 2201-2210, 2014. https://doi.org/10.1109/TPDS.2013.271
- S. Ruj, A. Nayak, and I. Stojmenovic, "DACC: Distributed access control in clouds," in Proceedings of the 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011). IEEE, 2011, pp. 91-98.
- K. Yang and X. Jia, "Expressive, efficient and revocable data access control for multi-authority cloud storage," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 7, 2013.
- J. Han, W. Susilo, Y. Mu, J. Zhou, and M. H. A. Au, "Improving privacy and security in decentralized cipher text policy attribute-based encryption," IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 665-678, 2015. https://doi.org/10.1109/TIFS.2014.2382297
- T. Jung, X.-Y. Li, Z. Wan, and M. Wan, "Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption," IEEE Transactions on Information Forensics and Security, vol. 10, no. 1, pp. 190-199, 2015. https://doi.org/10.1109/TIFS.2014.2368352
- K. Yang, X. Jia, and K. Ren, "Secure and verifiable policy update outsourcing for big data access control in the cloud," IEEE Transactions on Parallel & Distributed Systems, vol. 26, no. 12, pp. 3461-3470, 2015. https://doi.org/10.1109/TPDS.2014.2380373