References: [1] Wang, G., Liu, Q., Wu, J., Guo, M. (2011). Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Computers& security, 30 (5) 320-331. [2] El-Booz, S. A., Attiya, G., El-Fishawy, N. (2016). A secure cloud storage system combining time-based one-time password and automatic blocker protocol. EURASIP Journal on Information Security, 2016 (1), 13. [3] Dong, X., Yu, J., Luo, Y., Chen, Y., Xue, G., Li, M. (2014). Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. Computers & Security, 42, 151-164. [4] Wang, C., Chow, S. S., Wang, Q., Ren, K., Lou, W. (2013). Privacy-preserving public auditing for secure cloud storage. IEEE transactions on computers, 62 (2) 362-375. [5] Glabb, R., Imbert, L., Jullien, G., Tisserand, A., Veyrat-Charvillon, N. (2007). Multi-mode operator for SHA-2 hash functions. journal of systems architecture, 53 (2) 127-138. [6] Narula, N., Sethi, D., Bhattacharya, P. P. (2015). Comparative Analysis of DWT and DWT-SVD Watermarking Techniques in RGB Images. International Journal of Signal Processing, Image Processing and Pattern Recognition, 8 (4) 339-348. [7] Subhedar, M. S., Mankar, V. H. (2014 November). High Capacity Image Steganography based on Discrete Wavelet Transform and Singular Value Decomposition. In: Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies (p. 63). ACM. [8] Worku, S. G., Xu, C., Zhao, J., He, X. (2014). Secure and efficient privacy-preserving public auditing scheme for cloud storage. Computers & Electrical Engineering, 40 (5) 1703-1713. [9] Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W. (2012). Toward secure and dependable storage services in cloud computing. IEEE transactions on Services Computing, 5 (2) 220-232. [10] Loheswaran, K., Premalatha, J. (2016). Renaissance System Model Improving Security and Third Party Auditing in Cloud Computing. Wireless Personal Communications, 90 (2) 1051-1066. [11] Wang, Q., Wang, C., Ren, K., Lou, W., Li, J. (2011). Enabling public auditability and data dynamics for storage security in cloud computing. IEEE transactions on parallel and distributed systems, 22 (5) 847-859. |