References
[1]. Babitha, M. P., & Babu, K. R. (2016, September). Secure
cloud storage using AES encryption. In 2016, International
Conference on Automatic Control and Dynamic
Optimization Techniques (ICACDOT), (pp. 859-864). IEEE.
https://doi.org/10.1109/ICACDOT.2016.7877709
[2]. Chachapara, K., & Bhadlawala, S. (2013, November).
Secure sharing with cryptography in cloud computing. In
2013, Nirma University International Conference on
Engineering (NUiCONE), (pp. 1-3). IEEE. https://doi.org/10.
1109/NUiCONE.2013.6780085
[3]. Chu, C. K., Chow, S. S., Tzeng, W. G., Zhou, J., & Deng,
R. H. (2013). Key-aggregate cryptosystem for scalable
data sharing in cloud storage. IEEE Transactions on Parallel
and Distributed Systems, 25(2), 468-477. https://doi.org/10.
1109/TPDS.2013.112
[4]. Liu, J. K., Au, M. H., Huang, X., Lu, R., & Li, J. (2015). Finegrained
two-factor access control for web-based cloud
computing services. IEEE Transactions on Information
Forensics and Security, 11(3), 484-497. https://doi.org/
10.1109/TIFS.2015.2493983
[5]. Perez, J. M. M., Perez, G. M., & Gómez, A. F. S. (2016).
SecRBAC: Secure data in the Clouds. IEEE Transactions on
Services Computing, 10(5), 726-740. https://doi.org/10.
1109/TSC.2016.2553668
[6]. Prajapati, P., & Shah, P. (2020). A review on secure data
deduplication: Cloud storage security issue. Journal of King
Saud University-Computer and Information Sciences. (In Press). https://doi.org/10.1016/j.jksuci.2020.10.021
[7]. Puri, N. A., Karare, A. R., & Dharmik, R. C. (2014, May).
Deployment of application on cloud and enhanced data
security in cloud computing using ECC algorithm. In 2014,
IEEE International Conference on Advanced
Communications, Control and Computing Technologies,
(pp. 1667-1671). IEEE. https://doi.org/10.1109/ICACCCT.
2014.7019392
[8]. Rao, Y. S. (2017). A secure and efficient ciphertextpolicy
attribute-based signcryption for personal health
records sharing in cloud computing. Future Generation
Computer Systems, 67, 133-151. https://doi.org/10.1016/
j.future.2016.07.019
[9]. Tseng, Y. M., Tsai, T. T., Huang, S. S., & Huang, C. P.
(2016). Identity-based encryption with cloud revocation
authority and its applications. IEEE Transactions on Cloud
Computing, 6(4), 1041-1053. https://doi.org/10.1109/TCC.
2016.2541138
[10]. Ubaidur Rahman, N. H., Balamurugan, C., &
Mariappan, R. (2015). A novel DNA computing based
encryption and decryption algorithm. Procedia Computer
Science, 46, 463-475. https://doi.org/10.1016/j.procs.
2015.02.045
[11]. Xhafa, F., Wang, J., Chen, X., Liu, J. K., Li, J., & Krause,
P. (2014). An efficient PHR service system supporting fuzzy
keyword search and fine-grained access control. Soft
Computing, 18(9), 1795-1802. https://doi.org/10.1007/
s00500-013-1202-8