메뉴 건너뛰기




Volumn 11, Issue 2, 2017, Pages 395-404

SeDaSC: Secure Data Sharing in Clouds

Author keywords

Access control; cloud computing; high level Petri nets (HLPNs); modeling; Satisfiability Modulo Theory (SMT); Scyther; verification

Indexed keywords

ACCESS CONTROL; CLOUD COMPUTING; COMPUTATION THEORY; CRYPTOGRAPHY; DATA STORAGE EQUIPMENT; EMBEDDED SYSTEMS; FORMAL LOGIC; MOBILE CLOUD COMPUTING; MODELS; PETRI NETS; VERIFICATION;

EID: 85027442653     PISSN: 19328184     EISSN: 19379234     Source Type: Journal    
DOI: 10.1109/JSYST.2014.2379646     Document Type: Article
Times cited : (149)

References (15)
  • 1
    • 84904352832 scopus 로고    scopus 로고
    • A review on the State-of-the-art privacy preserving approaches in e-health clouds
    • Jul
    • A. Abbas and S. U. Khan, "A review on the State-of-the-art privacy preserving approaches in e-health clouds, " IEEE J. Biomed. Health Informat., vol. 18, no. 1, pp. 1431-1441, Jul. 2014.
    • (2014) IEEE J. Biomed. Health Informat , vol.18 , Issue.1 , pp. 1431-1441
    • Abbas, A.1    Khan, S.U.2
  • 2
    • 84925291770 scopus 로고    scopus 로고
    • An overview of the commercial cloud monitoring tools: Research dimensions, design issues, state-of-the-art
    • to be published
    • K. Alhamazani et al., "An overview of the commercial cloud monitoring tools: Research dimensions, design issues, state-of-the-art, " Computing, DOI: 10.1007/s00607-014-0398-5, 2014, to be published.
    • (2014) Computing
    • Alhamazani, K.1
  • 3
    • 84866668858 scopus 로고    scopus 로고
    • Towards secure mobile cloud computing: A survey
    • Jul
    • A. N. Khan, M. L. M. Kiah, S. U. Khan, and S. A. Madani, "Towards secure mobile cloud computing: A survey, " Future Gen. Comput. Syst., vol. 29, no. 5, pp. 1278-1299, Jul. 2013.
    • (2013) Future Gen. Comput. Syst , vol.29 , Issue.5 , pp. 1278-1299
    • Khan, A.N.1    Kiah, M.L.M.2    Khan, S.U.3    Madani, S.A.4
  • 4
    • 84889087663 scopus 로고    scopus 로고
    • Security and privacy for storage and computation in cloud computing
    • Feb
    • L. Wei, H. Zhu, Z. Cao, Y. Chen, and A. V. Vasilakos, "Security and privacy for storage and computation in cloud computing, " Inf. Sci., vol. 258, pp. 371-386, Feb. 2014.
    • (2014) Inf. Sci , vol.258 , pp. 371-386
    • Wei, L.1    Zhu, H.2    Cao, Z.3    Chen, Y.4    Vasilakos, A.V.5
  • 6
    • 84923106787 scopus 로고    scopus 로고
    • Fast and scalable multi-way analysis of massive neural data
    • Mar
    • D. Chen et al., "Fast and scalable multi-way analysis of massive neural data, " IEEE Trans. Comput., vol. 64, no. 3, pp. 707-719, Mar. 2015. DOI: 10.1109/TC.2013.2295806.
    • (2015) IEEE Trans. Comput , vol.64 , Issue.3 , pp. 707-719
    • Chen, D.1
  • 7
    • 84901987724 scopus 로고    scopus 로고
    • Incremental proxy re-encryption scheme for mobile cloud computing environment
    • May
    • A. N. Khan, M. M. Kiah, S. A. Madani, M. Ali, and S. Shamshir-band, "Incremental proxy re-encryption scheme for mobile cloud computing environment, " J. Supercomput., vol. 68, no. 2, pp. 624-651, May 2014.
    • (2014) J. Supercomput , vol.68 , Issue.2 , pp. 624-651
    • Khan, A.N.1    Kiah, M.M.2    Madani, S.A.3    Ali, M.4    Shamshir-Band, S.5
  • 8
    • 84868123935 scopus 로고    scopus 로고
    • Efficient and provably-secure group key management scheme using key derivation
    • Y. Chen and W. Tzeng, "Efficient and provably-secure group key management scheme using key derivation, " in Proc. IEEE 11th Int. Conf. TrustCom, 2012, pp. 295-302.
    • (2012) Proc. IEEE 11th Int. Conf. TrustCom , pp. 295-302
    • Chen, Y.1    Tzeng, W.2
  • 9
    • 84872004857 scopus 로고    scopus 로고
    • CL-PRE: A certificateless proxy reencryption scheme for secure data sharing with public cloud
    • L. Xu, X. Wu, and X. Zhang, "CL-PRE: A certificateless proxy reencryption scheme for secure data sharing with public cloud, " in Proc. 7th ACM Symp. Inf., Comput. Commun. Security, 2012, pp. 87-88.
    • (2012) Proc. 7th ACM Symp. Inf., Comput. Commun. Security , pp. 87-88
    • Xu, L.1    Wu, X.2    Zhang, X.3
  • 11
    • 84959540048 scopus 로고    scopus 로고
    • An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
    • Sep
    • S. Seo, M. Nabeel, X. Ding, and E. Bertino, "An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds, " IEEE Trans. Knowl. Data Eng., vol. 26, no. 9, pp. 2107-2119, Sep. 2013.
    • (2013) IEEE Trans. Knowl. Data Eng , vol.26 , Issue.9 , pp. 2107-2119
    • Seo, S.1    Nabeel, M.2    Ding, X.3    Bertino, E.4
  • 12
    • 79960886232 scopus 로고    scopus 로고
    • Secure group key management using uni-directional proxy re-encryption schemes
    • Y. Chen, J. D. Tygar, and W. Tzeng, "Secure group key management using uni-directional proxy re-encryption schemes, " in Proc. IEEE INFOCOM, pp. 1952-1960.
    • Proc. IEEE INFOCOM , pp. 1952-1960
    • Chen, Y.1    Tygar, J.D.2    Tzeng, W.3
  • 13
    • 0024645936 scopus 로고
    • Petri Nets: Properties, analysis and applications
    • Apr
    • T. Murata, "Petri Nets: Properties, analysis and applications, " Proc. IEEE, vol. 77, no. 4, pp. 541-580, Apr. 1989.
    • (1989) Proc. IEEE , vol.77 , Issue.4 , pp. 541-580
    • Murata, T.1
  • 14
    • 70649083043 scopus 로고    scopus 로고
    • Satisfiability modulo theories: An appetizer
    • Lecture Notes in Computer Science
    • L. Moura and N. Bjrner, "Satisfiability modulo theories: An appetizer, " in Proc. Formal Methods, Found. Appl., vol. 5902, Lecture Notes in Computer Science, 2009, pp. 23-36.
    • (2009) Proc. Formal Methods, Found. Appl , vol.5902 , pp. 23-36
    • Moura, L.1    Bjrner, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.