2016
DOI: 10.1016/j.procs.2016.06.062
|View full text |Cite
|
Sign up to set email alerts
|

Index Generation and Secure Multi-user Access Control over an Encrypted Cloud Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…This exploration technique ensures the information secrecy of cloud put away information. Raghavendra et al [37] presented the verified multi proprietor information sharing plan for the verified and security safeguarded information sharing result. This examination work ensures the verified information sharing result in the dynamic route by adjusting the RSA Chinese leftover portion hypothesis which guarantees the expanded security level.…”
Section: Discussion Of Different Dynamic Grouping Techniquesmentioning
confidence: 99%
“…This exploration technique ensures the information secrecy of cloud put away information. Raghavendra et al [37] presented the verified multi proprietor information sharing plan for the verified and security safeguarded information sharing result. This examination work ensures the verified information sharing result in the dynamic route by adjusting the RSA Chinese leftover portion hypothesis which guarantees the expanded security level.…”
Section: Discussion Of Different Dynamic Grouping Techniquesmentioning
confidence: 99%
“…Raghavendra et al [23] have presented a reliable multiproprietor information distribution for effective association in the cloud. The advantage of the scheme is that the repository space is efficiently utilized and has reduced the time to query documents from the cloud.…”
Section: Related Workmentioning
confidence: 99%
“…In 2018, N. Rahim et al [14] proposed a scheme to support secure search of images at mobile gallery phone. It encrypt images using a light-weight encryption algorithm on mobile device, and then it is uploaded to the cloud for features extraction to eliminate the computationally expensive process of features extraction on mobile.…”
Section: Related Work 21 Searchable Index Schemesmentioning
confidence: 99%