1 Hong Liu, "Shared authority based privacy-preserving authentication protocol in cloud computing" 26 (26): 241-251, 2015
2 Farhad Farokhi, "Secure and private cloud-based control using semi-homomorphic encryption" 49 (49): 163-168, 2016
3 Xuyun Zhang, "Proximity-aware local-recoding anonymization with map reduce for scalable big data privacy preservation in cloud" 64 : 2293-2307, 2015
4 Ning Cao, "Privacy-preserving multi-keyword ranked search over encrypted cloud data" 25 : 222-233, 2014
5 Bing Wang, "Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud" 2112-2120, 2014
6 Chia-Mu Yu, "Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data" 11 (11): 385-394, 2017
7 Zhang. X, "Privacy preservation over big data in cloud systems" Springer 239-257, 2014
8 J. Suganthi, "Privacy preservation and public auditing for cloud data using ASS in multi-cloud" 1-6, 2015
9 Kai Fan, "Privacy Protection Based Access Control Scheme in Cloud-Based Services" 14 (14): 61-71, 2017
10 Ryan Hayward, "Parallelizing fully homomorphic encryption for a cloud environment" 13 (13): 245-252, 2015
1 Hong Liu, "Shared authority based privacy-preserving authentication protocol in cloud computing" 26 (26): 241-251, 2015
2 Farhad Farokhi, "Secure and private cloud-based control using semi-homomorphic encryption" 49 (49): 163-168, 2016
3 Xuyun Zhang, "Proximity-aware local-recoding anonymization with map reduce for scalable big data privacy preservation in cloud" 64 : 2293-2307, 2015
4 Ning Cao, "Privacy-preserving multi-keyword ranked search over encrypted cloud data" 25 : 222-233, 2014
5 Bing Wang, "Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud" 2112-2120, 2014
6 Chia-Mu Yu, "Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data" 11 (11): 385-394, 2017
7 Zhang. X, "Privacy preservation over big data in cloud systems" Springer 239-257, 2014
8 J. Suganthi, "Privacy preservation and public auditing for cloud data using ASS in multi-cloud" 1-6, 2015
9 Kai Fan, "Privacy Protection Based Access Control Scheme in Cloud-Based Services" 14 (14): 61-71, 2017
10 Ryan Hayward, "Parallelizing fully homomorphic encryption for a cloud environment" 13 (13): 245-252, 2015
11 Wei Wang, "Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation" 88 : 136-148, 2015
12 Yong Yu, "Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage" 12 : 767-778, 2017
13 Manish M. Potey, "Homomorphic encryption for security of cloud data" 79 : 175-181, 2016
14 Khalil Hariss, "Fully enhanced homomorphic encryption algorithm of MORE approach for real world applications" 34 (34): 233-242, 2017
15 Khalid El, "Fast cloud-RSA scheme for promoting data confidentiality in the cloud computing" 113 : 33-40, 2017
16 Frank Li, "Exploring privacy preservation in outsourced k-nearest neighbors with multiple data owners" 53-64, 2015
17 Qinghua Shen, "Exploiting geo-distributed clouds for a e-health monitoring system with minimum service delay and privacy preservation" 18 (18): 430-439, 2014
18 Jun Tang, "Ensuring security and privacy preservation for cloud data services" 49 (49): 13-, 2016
19 Smaranika Dasgupta, "Design of a polynomial ring based symmetric homomorphic encryption scheme" 8 : 692-695, 2016
20 Kadam Prasad, "Data sharing security and privacy preservation in cloud computing" 1070-1075, 2015
21 Kaaniche. N, "Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms" 111 : 120-141, 2017