Beruflich Dokumente
Kultur Dokumente
https://dx.doi.org/10.22161/ijaers/3.12.5
www.ijaers.com
Page | 28
www.ijaers.com
Page | 29
authentication
Two Factor
Authentication
It is robust and
efficient against
phishing and replay
attacks.
more in
multilevel
authentication
Theft of mobile
phone leads to
breach of
security.
REFERENCES
[1] Shulan Wang, Kaitai Liang, Joseph K. Liu, Jianyong
Chen, Jianping Yu, Weixin Xie ,"Attribute-Based Data
Sharing Scheme Revisited in Cloud Computing", IEEE
Transactions on Information Forensics and Security, 2016
[2] Shulan Wang, Junwei Zhou, Joseph K. Liu, Jianping Yu,
Jianyong Chen, Weixin Xie ,"An Efficient File Hierarchy
Attribute-Based
Encryption
Scheme
in
Cloud
Computing", IEEE Transactions on Information Forensics
and Security, 2016
[3] Joseph K. Liu, Man Ho Au, Xinyi Huang, Rongxing Lu
and Jin Li , Fine-Grained Two-Factor Access Control for
Web-Based Cloud Computing Services ,IEEE
TRANSACTIONS ON INFORMATION FORENSICS
AND SECURITY, VOL. 11, NO. 3, MARCH 2016
[4] Xinfeng Ye, "Privacy Preserving and Delegated Access
Control for Cloud Applications", TSINGHUA SCIENCE
AND TECHNOLOGY (c) IEEE, ISSN l1007-0214l
l04/10l lpp40-54 Volume 21, Number 1, February 2016
[5] SU Mang, LI Fenghua, SHI Guozhen, GENG Kui and
XIONG Jinbo ,"A User-Centric Data Secure Creation
Scheme in Cloud Computing", Chinese Journal of
Electronics Vol.25, No.4, July 2016
[6] Kaitai Liang and Willy Susilo, "Searchable AttributeBased Mechanism with Efficient Data Sharing for Secure
Cloud Storage", IEEE Transactions on Information
Forensics and Security, 2015
Page | 30
www.ijaers.com
Page | 31