Citation: | SU Mang, LI Fenghua, SHI Guozhen, et al., “A User-Centric Data Secure Creation Scheme in Cloud Computing,” Chinese Journal of Electronics, vol. 25, no. 4, pp. 753-760, 2016, doi: 10.1049/cje.2016.07.017 |
Y. Fu, S. Luo and J. Shu, "Survey of secure cloud storage system and key technologies", Journal of Computer Research and Development, Vol.50, No.1, pp.136-145, 2013. (in Chinese)
|
M. Su, F. Li, Z. Tang, et al., "An action-based fine-grained access control mechanism for structured documents and its application", The Scientific World Journal, Vol.2014, pp.1-13, 2014.
|
J. Xiong, F. Li, J. Ma, et al., "A full lifecycle privacy protection scheme for sensitive data in cloud computing", Peer-to-Peer Networking and Applications, pp.1-13, 2014.
|
G. Sun, N. Dong and Y. Li, "CP-ABE based data access control for cloud storage", Journal on Communications, Vol.32, No.7, pp.146-152, 2011. (in Chinese)
|
K. Yang and X. Jia, "Attributed-based access control for multi-authority systems in cloud storage", Proc. of the International Conference on Distributed Computing Systems, Macau, China, pp.536-545, 2012.
|
J. Xiong, Z. Yao, J. Ma, et al., "A secure self-destruction with IBE for the internet content privacy", Chinese Journal of Computer, Vol.37, No.1, pp.139-150, 2014. (in Chinese)
|
Q. Tang, "Type-based proxy re-encryption and its construction", Proc. of the International Conference on Cryptology in India:Progress in Cryptology, Kharagpur, India, pp.130-144, 2008
|
J. Zhao, D. Feng, L. Yang, et al., "CCA-secure type-based proxy re-encryption without pairings", Acta Electronica Sinica, Vol.39, No.11, pp.2513-2519, 2011. (in Chinese)
|
X. Wang and W. Zhong, "A new identity based proxy re-encryption scheme", Proc. of the International Conference on Biomedical Engineering and Computer Science, Wuhan, China, pp.1-4, 2010.
|
X. Liang, Z. Cao, H. Lin, et al., "Attribute based proxy re-encryption with delegating capabilities", Proc. of the International Symposium on Information, Computer, and Communications Security, Sydney, Australia, pp.276-286, 2009.
|
C. Sur, Y. Park, S.U. Shin, et al., "Certificate-based proxy re-encryption for public cloud storage", Proc. of the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Taichung, Taiwan, pp.159-166, 2013.
|
Z. Xu and K.M. Martin, "Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage", Proc. of the International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, pp.844-849, 2012.
|
X. Jia, J. Shao, J. Jing, et al., "CCA-secure type-based proxy re-encryption with invisible proxy", Proc. of the International Conference on Computer and Information Technology, Bradford, UK, pp.1299-1305, 2010.
|
J. Weng, R. Deng, X. Ding, et al., "Conditional proxy re-encryption secure against chosen-ciphertext attack", Proc. of the International Symposium on Information, Computer, and Communications Security, Sydney, Australia, pp.322-332, 2009.
|
Q. Liu, G. Wang and J. Wu, "Time-based proxy re-encryption scheme for secure data sharing in a cloud environment", Information Sciences, Vol.258, pp.355-370, 2014.
|