Open Access
Issue
E3S Web Conf.
Volume 472, 2024
International Conference on Renewable Energy, Green Computing and Sustainable Development (ICREGCSD 2023)
Article Number 02001
Number of page(s) 11
Section Green Computing
DOI https://doi.org/10.1051/e3sconf/202447202001
Published online 05 January 2024
  1. D. Bernstein, “Containers and cloud: From lxc to docker to kubernetes,” IEEE cloud computing, vol. 1, no. 3, pp. 81–84, 2014. [CrossRef] [Google Scholar]
  2. J. K. Liu, M. H. Au, X. Huang, R. Lu, and J. Li, “Fine-grained two-factor access control for web-based cloud computing services,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 3, pp. 484–497, 2015. [Google Scholar]
  3. A. Kumar, T. Aljrees, S.-Y. Hsieh, K. U. Singh, T. Singh, L. Raja, J. K. Samriya, and R. K. Mundotiya, “A hybrid solution for secure privacy-preserving cloud storage & information retrieval,” Human-centric Computing and Information Sciences, Vol. 13, 2023. [Google Scholar]
  4. S. Kautish, S. Juneja, K. Mohiuddin, F. K. Karim, H. Elmannai, S. Ghorashi, and Y. Hamid, “Enhanced cloud storage encryption standard for security in distributed environments,” Electronics, vol. 12, no. 3, p. 714, 2023. [CrossRef] [Google Scholar]
  5. S. P. Otta, S. Panda, M. Gupta, and C. Hota, “A systematic survey of multi-factor authentication for cloud infrastructure,” Future Internet, vol. 15, no. 4, p. 146, 2023. [CrossRef] [Google Scholar]
  6. P. Lofgren and N. Hopper, “Bnymble: More anonymous blacklisting at almost no cost (a short paper),” in International Conference on Financial Cryptography and Data Security, pp. 268–275, Springer, 2011. [Google Scholar]
  7. M. H. Au and A. Kapadia, “Perm: Practical reputation-based blacklisting without ttps,” in Proceedings of the 2012 ACM conference on Computer and communications security, pp. 929–940, 2012. [CrossRef] [Google Scholar]
  8. M. Jensen, S. Schäge, and J. Schwenk, “Towards an anonymous access control and accountability scheme for cloud computing,” in 2010 IEEE 3rd International Conference on Cloud Computing, pp. 540–541, IEEE, 2010. [Google Scholar]
  9. H. Deng, Q. Wu, B. Qin, S. S. Chow, J. Domingo-Ferrer, and W. Shi, “Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data,” in Proceedings of the 9th ACM symposium on Information, computer and communications security, pp. 425–434, 2014. [CrossRef] [Google Scholar]
  10. J. Camenisch, S. Hohenberger, M. Kohlweiss, A. Lysyanskaya, and M. Meyerovich, “How to win the clonewars: efficient periodic n-times anonymous authentication,” in Proceedings of the 13th ACM conference on Computer and communications security, pp. 201–210, 2006. [Google Scholar]
  11. R. Cramer, I. Damgård, and P. MacKenzie, “Efficient zero-knowledge proofs of knowledge without intractability assumptions,” in International Workshop on Public Key Cryptography, pp. 354–372, Springer, 2000. [CrossRef] [Google Scholar]
  12. D. Kalyani, C. Raghavendra, and K. R. Prasad, “An improved lung cancer prediction system using image processing,” International Journal of Recent Technology and Engineering, Vol. 8, 2019. [Google Scholar]
  13. M. H. Au, W. Susilo, and Y. Mu, “Constant-size dynamic k-taa,” in Security and Cryptography for Networks: 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings 5, pp. 111–125, Springer, 2006. [Google Scholar]
  14. A. H. A. Al-Jumaili, R. C. Muniyandi, M. K. Hasan, J. K. S. Paw, and M. J. Singh, “Big data analytics using cloud computing based frameworks for power management systems: Status, constraints, and future recommendations,” Sensors, vol. 23, no. 6, p. 2952, 2023. [CrossRef] [PubMed] [Google Scholar]
  15. A. Razaque, N. Shaldanbayeva, B. Alotaibi, M. Alotaibi, A. Murat, and A. Alotaibi, “Big data handling approach for unauthorized cloud computing access,” Electronics, vol. 11, no. 1, p. 137, 2022. [CrossRef] [Google Scholar]
  16. H.-Y. Lin, T.-T. Tsai, P.-Y. Ting, and Y.-R. Fan, “Identity-based proxy reencryption scheme using fog computing and anonymous key generation,” Sensors, vol. 23, no. 5, p. 2706, 2023. [CrossRef] [PubMed] [Google Scholar]
  17. P. Chinnasamy, P. Deepalakshmi, A. K. Dutta, J. You, and G. P. Joshi, “Ciphertext-policy attribute-based encryption for cloud storage: Toward data privacy and authentication in ai-enabled iot system,” Mathematics, vol. 10, no. 1, p. 68, 2021. [CrossRef] [Google Scholar]
  18. C. Raghavendra, K. Reddy, M. Shanmugathai, and A. Devipriya, “Electron microscopy images for automatic bacterial trichomoniasis diagnostic classification separating and sorting of overlapping microbes,” in AIP Conference Proceedings, Vol. 2523, AIP Publishing, 2023. [Google Scholar]
  19. M. Venema, G. Alpár, and J.-H. Hoepman, “Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice,” Designs, Codes and Cryptography, vol. 91, no. 1, pp. 165–220, 2023. [CrossRef] [Google Scholar]
  20. S. Sun, H. Ma, R. Zhang, and W. Xu, “Server-aided immediate and robust user revocation mechanism for sm9,” Cybersecurity, vol. 3, pp. 1–13, 2020. [CrossRef] [Google Scholar]
  21. A. M. Sauber, P. M. El-Kafrawy, A. F. Shawish, M. A. Amin, and I. M. Hagag, “A new secure model for data protection over cloud computing,” Computational Intelligence and Neuroscience, vol. 2021, pp. 1–11, 2021. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.