1.
W. Diffie and M. Hellman, “New direction in cryptography,†IEEE Information Theory, vol. 22, no. 6, pp. 644-654, Sep. 1976.
2.
Q. Wang, C. Wang, J. Li, K. Ran, and W. Lou, ―Enabling Public Verifiability and Information Dynamic for Storage Security in Cloud Computing,‖ in the Proceedings of ESORICS 2009. Springer-Verlag, 2009, pp. 355–370.
3.
D. Boneh and X. Boeh, “Short signatures without random oracles, in Proc. Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2004, pp. 56-73.
4.
Wang, Boyang, Baochun Li, and Hui Li. "Panda: public auditing for shared data with efficient user revocation in the cloud." IEEE Transactions on services computing 8.1 (2015): 92-106.
5.
Z. Liu, J. Li, X. Chen, J. Yang, and C. Jia, “TMDS: Thin-model data sharing scheme supporting keyword search in cloud storage,†Information Security and Privacy Lecture Notes in Computer Science, vol. 8544, pp. 115-130, 2014.
6.
C. Liu, J. Chen, L. Yang, X. Zhang, C. Yang, R. Ranjan, and K. Ra-mamohanrao, “Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates,†IEEE Transactions Parallel and Distributed Systems, vol. 25, no. 9, pp. 2234-2244, Sep. 2014.
7.
M.S.Premalatha and Dr.B.Ramakrishnan “Green scheduling of Bag-of-tasks Applications in cloud data centre using green cloud simulator†Journal of Emerging technologies in web intelligence, vol.6, no.3, August 2014.
8.
B. Wang, B. Li, and H. Li,Oruta: “privacy-preserving public auditing for shared data in the cloud,†in Proc. IEEE International Conference on Cloud Computing, 2012, pp. 293-302.
9.
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public audit ability and data dynamics for storage security in cloud computing,†IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.
10.
Panda: Public Auditing for Shared Information with Efficient User Revocation in the Cloud Boyang Wang, Baochun Li, Member, IEEE, and Hui Li, Member, IEEE, transactions on service computing no:99 vol:pp year 2014.
11.
J. Yuan and S. Yu, “Efficient public integrity checking for cloud data sharing with multi-user modification,†in Proc. IEEE INFOCOM, 2014, pp. 2121-2129
12.
Y. Zhu, G. Ahn, H. Hu, S. Yau, H.An, and S. Chen, “Dynamic audit services for outsourced storages in clouds,†IEEE Transactions on Services Competing, vol. 6, no. 2, pp. 227-238, 2013.
13.
B. Wang, B. Li, and H. Li, “Knox: Privacy-preserving public auditing for shared data with large groups in the cloud,†in Proc. of ACNS, 2012, pp. 507-525.
14.
Dr. J. Suganthi, Ananthi .J S. Archana,†Privacy preservation and Public Auditing for cloud Data Using ASSâ€, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 3, Issue 6, November-December 2014 PP: 242-247.
15.
B. Wang, B. Li, and L. Hui, “Panda: Public auditing for shared data with efficient user revocation in the cloud,†in Proc. IEEE INFOCOM, pp. 2904-2912, 2013.
16.
D. Boneh and M. K. Franklin, “Identity-based encryptions from the wail pairing,†in CRYPTO’01. Springer-Verlag, 2001, pp. 213- 229.