Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 3
Page No. 578 - 592

Quantum Cryptographic Approach to Decentralized Access Control and Privacy Preserving in Cloud

Authors : K. Vidya, V.S. Alamelu, K. Sashi Kumar and L. Sree Chandraa

References

Arun, M. and S. Saravanan, 2013. Reversible arithmetic logic gate for quantum computation. Int. J. Intell. Eng. Syst., 6: 1-9.

Buyya, R., 2013. Introduction to the IEEE transactions on cloud computing. IEEE. Trans. Cloud Comput., 1: 3-21.
Direct Link  |  

Chen, J. and H. Ma, 2014. Efficient decentralized attribute-based access control for cloud storage with user revocation. Proceedings of the 2014 IEEE International Conference on Communications (ICC), June 10-14, 2014, IEEE, Sydney, NSW., pp: 3782-3787.

Hasan, M.M., 2008. Low-cost realization of toffoli gate for the low-cost synthesis of quantum ternary logic functions. Proceedings of the 11th International Conference on Computer and Information Technology ICCIT 2008, December 24-27, 2008, IEEE, Khulna, Bangladesh, pp: 259-263.

Kuhn, D.R., E.J. Coyne and T.R. Weil, 2010. Adding attributes to role-based access control. IEEE. Comput., 43: 79-81.
Direct Link  |  

Maslov, D., C.Young, D.M. Miller and G.W. Dueck, 2005. Quantum circuit simplification using templates. Proceedings of the Conferences Design, Automation and Test in Europe 2005, March 7-11, 2005, IEEE, USA., ISBN: 0-7695-2288-2, pp: 1208-1213.

Qiao, Z., S. Liang, S. Davis and H. Jiang, 2014. Survey of attribute based encryption. Proceedings of the 2014 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), June 30-July 2, 2014, IEEE, Las Vegas, NV., pp: 1-6.

Ruj, S., A. Nayak and I. Stojmenovic, 2011. Dacc: Distributed access control in clouds. Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), November 16-18, 2011, IEEE, Changsha, China, pp: 91-98.

Ruj, S., M. Stojmenovic and A. Nayak, 2014. Decentralized access control with anonymous authentication of data stored in clouds. Parallel Distrib. Syst. IEEE. Trans., 25: 384-394.
CrossRef  |  Direct Link  |  

Shaikh, F.B. and S. Haider, 2011. Security threats in cloud computing. Proceedings of the International Conference on Internet Technology and Secured Transactions, December 11-14, 2011, Abu Dhabi, pp: 214-219.

Sharbaf, M.S., 2009. Quantum cryptography: A new generation of information technology security system. Proceedings of the Sixth International Conference on Information Technology: New Generations ITNG'09, April 27-29, 2009, IEEE, Las Vegas, NV., pp: 1644-1648.

Wang, C., Q. Wang, K. Ren, N. Cao and W. Lou, 2012. Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput., 5: 220-232.
CrossRef  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved