2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE) 2014
DOI: 10.1109/icgccee.2014.6921421
|View full text |Cite
|
Sign up to set email alerts
|

Secure file sharing using cryptographic techniques in cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…[2] This paper titled "Secure File Sharing Scheme for Mobile Devices" is used for understanding of an ideal file sharing method is all mobile users can directly share their files one-to-one in the mobile peer-to-peer environment. [3] This paper titled "Secure File Sharing Using Cryptographic Techniques in Cloud" is used for understanding of facility of secure storing and sharing the data for dynamic groups in the cloud. By using group signature and encryption techniques any cloud users can efficiently share their data in untrusted cloud.…”
Section: Surveymentioning
confidence: 99%
“…[2] This paper titled "Secure File Sharing Scheme for Mobile Devices" is used for understanding of an ideal file sharing method is all mobile users can directly share their files one-to-one in the mobile peer-to-peer environment. [3] This paper titled "Secure File Sharing Using Cryptographic Techniques in Cloud" is used for understanding of facility of secure storing and sharing the data for dynamic groups in the cloud. By using group signature and encryption techniques any cloud users can efficiently share their data in untrusted cloud.…”
Section: Surveymentioning
confidence: 99%
“…The variant of the short group signature scheme [47] will be used to achieve anonymous access control, as it supports efficient member-ship revocation [48]. Researchers [49][50][51][52][53][54][55] suggested a technique using group signature for sharing the data in dynamic groups through cloud computing. Additionally, few of them have focused towards proxy signature referred in [56][57][58][59][60][61][62][63] for sharing data over the cloud.…”
Section: Studies Related To Group Signaturementioning
confidence: 99%