1.
G. K. Sandhia and S. V. K. Raja, “Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography”, Journal of Ambient Intelligence and Humanized Computing, Springer, 2021, Pages 1-15Volume 13, pages 3893–3902.
2.
Ruixuan Li, Chenglin Shen, Heng He, XiwuGu, Zhiyong Xu and Cheng-Zhong Xu “A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing”, IEEE Transactions on Cloud Computing, Volume 6, Issue 2, April-June 2018, Pages 344 – 357.
3.
Pandi Vijayakumar, S. Milton Ganesh, Lazarus Jegatha Deborah, SK Hafizul Islam, Mohammad Mehedi Hassan, Abdulahmeed Alelaiwi and Giancarlo Fortino, “MGPV: A novel and efficient scheme for secure data sharing among mobile users in the public cloud”, Future Generation Computer Systems, Elsevier, Volume 95, June 2019, Pages 560-569
4.
Chaitanya Singh, Deepika Chauhan, Sushama A. Deshmukh, Swati Sudhakar Vishnu and Ranjan Walia,“Medi-Block record: Secure data sharing using block chain technology”, Informatics in Medicine, Elsevier, Volume 24, 2021, Pages 1-15.
5.
Sreeja Cherillath Sukumaran and Mohammed Misbahuddin, “PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing”, Journal of King Saud University - Computer and Information Sciences, Elsevier, Volume 33, Issue 4, May 2021, Pages 426-435.
6.
Alaa Omran Almagrabi and A. K. Bashir, “A Classification-based Privacy-Preserving Decision-Making for Secure Data Sharing in Internet of Things Assisted Applications”, Digital Communications and Networks, Elsevier, Volume 8, Issue 4, August 2022, Pages 436-445.
7.
Loai A. Tawalbeh and Gokay Saldamli, “Reconsidering big data security and privacy in cloud and mobile cloud systems”, Journal of King Saud University-Computer and Information Sciences, Elsevier, Volume 33, Issue 7, September 2021, Pages 810-819.
8.
Qinyang Miao, Hui Lin, Xiaoding Wang, Mohammad Mehedi Hassan, “Federated deep reinforcement learning based secure data sharing for Internet of Things”, Computer Networks, Elsevier, Volume 197, October 2021, Pages 1-15.
9.
Qian Xu, Chengxiang Tan, Zhijie Fan, Wenye Zhu, Ya Xiao and Fujia Cheng, “Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption”, IEEE Access, Volume 6, 2018, Pages 34051 – 34074.
10.
Manreet Sohal and Sandeep Sharma, “BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing”, Journal of King Saud University - Computer and Information Sciences, Elsevier, Volume 34, Issue 1, January 2022, Pages 1417-1425.
11.
Suyel Namasudra, “An improved attribute?based encryption technique towards the data security in cloud computing”, Concurrency Computation Practice Experience, Wiley, Volume 31, Issue 3, 2019, Pages 1-15.
12.
K. Rajesh Rao, Indranil Ghosh Ray, Waqar Asif, Ashalatha Nayak and Muttukrishnan Rajarajan, “R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data”, IEEE Access, Volume 7, 2019, Pages 133274 – 133289.
13.
Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh, Tooska Dargahi, “PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications”, Future Generation Computer Systems, Elsevier, Volume 111, October 2020, Pages 899-918.
14.
Shilpi Harnal and R.K. Chauhan, “Hybrid Cryptography based E2EE for Integrity & Confidentiality in Multimedia Cloud Computing”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), Volume 8 Issue 10, 2019, Pages 918-924.
15.
Xiong Li, Saru Kumari, Jian Shen, Fan Wu, Caisen Chen, SK Hafizul Islam, “Secure Data Access and Sharing Scheme for Cloud Storage”, Wireless Personal Communications, Springer, Volume 96, Issue 4, 2017, Pages 5295–5314.
16.
Hu Xiong, Hao Zhang and Jianfei Sun “Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing”, IEEE Systems Journal, Volume 13, Issue 3, September 2019, Pages 2739 – 2750.
17.
Prerna Agarwal, Dr.S.P.Singh and Pranav Shrivastava, “A Safe and Resilient Cryptographic System for Dynamic Cloud Groups with Secure Data Sharing and Efficient User Revocation”, Turkish Journal of Computer and Mathematics Education, Volume 12, Issue 3, 2021, Pages 5164-5175.
18.
Nabeil Eltayieb, Ping Wang, Alzubair Hassan, Rashad Elhabob and Fagen Li “ASDS: Attribute-based secure data sharing scheme for reliable cloud environment”, Volume 2, Issue 2, March/April 2019, Pages 1-11.
19.
Leyou Zhang, Yilei Cui and Yi Mu, “Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing”, IEEE Systems Journal, Volume 14, Issue 1, March 2020, Pages 387 – 397.
20.
K. V. Pradeep, V. Vijayakumar, and V. Subramaniyaswamy, “An Efficient Framework for Sharing a File in a Secure Manner Using Asymmetric Key Distribution Management in Cloud Environment”, Journal of Computer Networks and Communications, Hindawi Publishing Corporation, Volume 2019, 2019, Pages 1-15.
21.
Uma Narayanan, Varghese Paul Shelbi Joseph, “A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment” Journal of King Saud University – Computer and Information Sciences Volume 34, Issue 6, June 2022, Pages 3121-3135.
22.
Yuntao Wang, Zhou Su, Qichao Xu, Ruidong Li, Tom H. Luan, and Pinghui Wang, “A Secure and Intelligent Data Sharing Scheme for UAV-Assisted Disaster Rescue”Volume: 31, Issue: 6, December 2023,Pages 2422 – 2438.
23.
Pattavee Sanchol and Somchart Fugkeaw , “A Fully Outsourced Attribute-Based Signcryption Scheme Supporting Privacy-Preserving Policy Update in Mobile Cloud Computing”Volume: 11,Pages 145915 – 145930.
24.
Zhiqiang Wang, Wenjing Gao, Ming Yang, Rong Hao, “Enabling Secure Data sharing with data deduplication and sensitive information hiding in cloud-assisted Electronic Medical Systems” Volume 26, 2023, Pages 3839–3854.
25.
Xiuqing Lu, Zhenkuan Panand Hequn Xian, “An efficient and secure data sharing scheme for mobile devices in cloud computing”, Issue :9, Pages 1-13,
26.
S. Velmurugan, M. Prakash, S. Neelakandan and Arun Radhakrishnan, “Provably secure data selective sharing scheme with cloud based decentralized trust management systems” Volume 13, Issue :1, Pages 1-20.
27.
Na Wang, Junsong Fu, Shancheng Zhang, Zheng Zhang, Jiawen Qiao, Jianwei Liu, and Bharat K. Bhargava, Life Fellow, “Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain” Volume: 31, Issue: 4, 2023, Pages 1550 – 1565.
28.
Haifeng Li, Caihui Lan, Xingbing Fu, Caifen Wang, Fagen Li and He Guo, “A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing”, Volume 20, Issue :17, Pages 1-17.
29.
Pattavee Sanchol and Somchart Fugkeaw, “A Fully Outsourced Attribute-Based Signcryption Scheme Supporting Privacy-Preserving Policy Update in Mobile Cloud Computing”, IEEE Access, Volume: 11, December 2023, Page(s): 145915 – 145930, DOI: 10.1109/ACCESS.2023.3341095.
30.
Vishal Garg, “Enhancing mobile data security using red panda optimized approach with chaotic fuzzy encryption in mobile cloud computing”, Concurrency and Computation Practice and Experience, Volume 36, Issue 1, July 2024, DOI:10.1002/cpe.8243.
31.
Xiuqing Lu, Zhenkuan Pan and Hequn Xian, “An efficient and secure data sharing scheme for mobile devices in cloud computing”, Journal of Cloud Computing volume 9, Article number: 60, 2020.
32.
Dilip Venkata Kumar Vengala, D. Kavitha and A. P. Siva Kumar, “Three factor authentication system with modified ECC based secured data transfer: untrusted cloud environment”, Complex & Intelligent Systems, Springer 2023, Volume 9, pages: 2915–2928, https://doi.org/10.1007/s40747-021-00305-0.
33.
Linsheng Yu, Mingxing He, Hongbin Liang, Ling Xiong and Yang Liu, “A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services”, Sensors 2023, Volume 23, Issue 3, 1264; https://doi.org/10.3390/s23031264.
34.
Madireddy Swetha and M. Latha, “Security on mobile cloud computing using cipher text policy and attribute based encryption scheme”, Materials Today: Proceedings, Volume 80, Part 3, 2023, Pages 3059-3063.
35.
Jie Cui, Bei Li, Hong Zhong, Yan Xu, Lu Liu, “Achieving Revocable Attribute Group-Based Encryption for Mobile Cloud Data: A Multi-Proxy Assisted Approach” IEEE Transactions on Dependable and Secure Computing, Volume: 20, Issue: 4, 01 July-Aug. 2023, Page(s): 2988 – 3001, DOI: 10.1109/TDSC.2022.3204549.