- Q. Chai and G. Gong, “Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers,” in 2012 IEEE International Conference on Communications (ICC), pp. 917-922, 2012.
- M. A. AlZain, E. Pardede, B. Soh, and J. A. Thom, “Cloud computing security: from single to multi-clouds,” in System Science (HICSS), 2012 45th Hawaii International Conference on, pp. 5490-5499, 2012.
- A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, pp. 612-613, 1979.
- M. O. Rabin, “Efficient dispersal of information for security, load balancing, and fault tolerance,” Journal of the ACM (JACM), vol. 36, pp. 335-348, 1989.
- A. Bessani, M. Correia, B. Quaresma, F. Andre, and P. Sousa, “DepSky: dependable and secure storage in a cloud-of-clouds,” ACM Transactions on Storage (TOS), vol. 9, p. 12, 2013.
- C. Soriente, G. O. Karame, H. Ritzdorf, S. Marinovic, and S. Capkun, “Commune: Shared ownership in an agnostic cloud,” in Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, pp. 39-50, 2015.
- S. Takahashi, S. Kobayashi, H. Kang, and K. Iwamura, “Secret sharing scheme for cloud computing using IDs,” in 2013 IEEE 2nd Global Conference on Consumer Electronics (GCCE), pp. 528-529, 2013.
- R. L. de Souza, H. V. Netto, L. C. Lung, and R. F. Custodio, “SSICC: sharing sensitive information in a cloud-of-clouds,” in Proceedings of the 9th International Conference on Systems (ICONS’14), pp. 185-191, 2014.
- A. Afianian, S. Nobakht, and M. Ghaznavi-Ghoushchi, “Energy-efficient secure distributed storage in mobile cloud computing,” in 2015 23rd Iranian Conference on Electrical Engineering, pp. 740-745, 2015.
- J. K. Resch, “Development Cleversafe, Inc. 222, S. Riverside Plaza, Suite 1700 Chicago, IL 6060,” 2011.
- R. L. Rivest, “All-or-nothing encryption and the package transform,” in International Workshop on Fast Software Encryption, pp. 210-218, 1997.
- I. S. Reed and G. Solomon, “Polynomial codes over certain finite fields,” Journal of the society for industrial and applied mathematics, vol. 8, pp. 300-304, 1960.
- J. Aycock, “Computer viruses and malware,” vol. 22: Springer Science & Business Media, 2006.
- J. Daemen and V. Rijmen, “The design of Rijndael: AES-the advanced encryption standard,” Springer Science & Business Media, 2013.
- W. Ren, L. Yu, R. Gao, and F. Xiong, “Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing,” Tsinghua Science & Technology, vol. 16, pp. 520-528, 2011.
- W. Jia, H. Zhu, Z. Cao, L. Wei, and X. Lin, “SDSM: a secure data service mechanism in mobile cloud computing,” in Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on, pp. 1060-1065, 2011.
- M. Green and G. Ateniese, “Identity-based proxy re-encryption,” in Applied Cryptography and Network Security, pp. 288-306, 2007.
- X. Liu, R. Jiang, and H. Kong, “SSOP: Secure storage outsourcing protocols in mobile cloud computing,” in Communication Technology (ICCT), 2012 IEEE 14th International Conference on, pp. 678-683, 2012.
- J. Somorovsky, C. Meyer, T. Tran, M. Sbeiti, J. Schwenk, and C. Wietfeld, “SeC2: Secure Mobile Solution for Distributed Public Cloud Storages,” in CLOSER, pp. 555-561, 2012.
- A.-k. A. Abdalla and A.-S. K. Pathan, “On protecting data storage in mobile cloud computing paradigm,” IETE Technical Review, vol. 31, pp. 82-91, 2014.
- P. Garg and V. Sharma, “An efficient and secure data storage in Mobile Cloud Computing through RSA and Hash function,” in Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on, pp. 334-339, 2014.
- Z. Zhou and D. Huang, “Efficient and secure data storage operations for mobile cloud computing,” in Proceedings of the 8th International Conference on Network and Service Management, pp. 37-45, 2012.
- M. Li, “On the confidentiality of information dispersal algorithms and their erasure codes,” arXiv preprint arXiv: 1206.4123, 2012.
- L. S. Hill, “Cryptography in an algebraic alphabet,” The American Mathematical Monthly, vol. 36, pp. 306-312, 1929.
- J. Lacan and J. Fimes, “Systematic MDS erasure codes based on Vandermonde matrices,” IEEE Communications Letters, vol. 8, pp. 570-572, 2004.
- I. Levin, “A byte-oriented implementation of AES,” Available: http://literatecode.com/AES256
|