Syam Kumar Pasupuleti

Orcid: 0000-0003-3777-3245

According to our database1, Syam Kumar Pasupuleti authored at least 26 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Lattice-Based Efficient Certificateless Public Auditing Scheme from RLWE for Cloud Storage.
Proceedings of the 24th IEEE International Symposium on Cluster, 2024

2023
Practical verifiable multi-keyword attribute-based searchable signcryption in cloud storage.
J. Ambient Intell. Humaniz. Comput., 2023

2022
A lightweight pairing-free ciphertext-policy attribute-based signcryption for cloud-assisted IoT.
Peer-to-Peer Netw. Appl., 2022

Traceable and revocable multi-authority attribute-based keyword search for cloud storage.
J. Syst. Archit., 2022

FELT-ABKS: Fog-Enabled Lightweight Traceable Attribute-Based Keyword Search Over Encrypted Data.
IEEE Internet Things J., 2022

Efficient Pairing-Free Identity-Based Signcryption Scheme for Cloud-Assisted IoT.
Int. J. Cloud Appl. Comput., 2022

2021
CP-ABSEL: Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage.
Peer-to-Peer Netw. Appl., 2021

Enhanced attribute based access control with secure deduplication for big data storage in cloud.
Peer-to-Peer Netw. Appl., 2021

Certificateless privacy preserving public auditing for dynamic shared data with group user revocation in cloud storage.
J. Parallel Distributed Comput., 2021

Attribute-based public integrity auditing for shared data with efficient user revocation in cloud storage.
J. Ambient Intell. Humaniz. Comput., 2021

Dynamic traceable CP-ABE with revocation for outsourced big data in cloud storage.
Int. J. Commun. Syst., 2021

Certificateless multi-replica public integrity auditing scheme for dynamic shared data in cloud storage.
Comput. Secur., 2021

2020
A scoping review of searchable encryption schemes in cloud computing: taxonomy, methods, and recent developments.
J. Supercomput., 2020

Efficient Escrow-free CP-ABE with Constant Size Ciphertext and Secret Key for Big Data Storage in Cloud.
Int. J. Cloud Appl. Comput., 2020

Key-Escrow Free Attribute-Based Multi-Keyword Search with Dynamic Policy Update in Cloud Computing.
Proceedings of the 20th IEEE/ACM International Symposium on Cluster, 2020

A Novel AckIBE-Based Secure Cloud Data Management Framework.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020

2019
A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud.
J. Ambient Intell. Humaniz. Comput., 2019

Efficient revocable CP-ABE for big data access control in cloud computing.
Int. J. Secur. Networks, 2019

Review of remote data integrity auditing schemes in cloud computing: taxonomy, analysis, and open issues.
Int. J. Cloud Comput., 2019

Privacy-Preserving Public Auditing and Data Dynamics for Secure Cloud Storage Based on Exact Regenerated Code.
Int. J. Cloud Appl. Comput., 2019

2018
Attribute based encryption in cloud computing: A survey, gap analysis, and future directions.
J. Netw. Comput. Appl., 2018

Effective and secure data storage in multi-cloud storage architectures.
Int. J. Inf. Commun. Technol., 2018

Lightweight Verifiable Auditing for Outsourced Database in Cloud Computing.
Proceedings of the Distributed Computing and Internet Technology, 2018

Attribute based Range Search over Encrypted Data for Privacy Preserving in Cloud Computing.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

2016
An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing.
J. Netw. Comput. Appl., 2016

2015
Simulated Raindrop Algorithm to Mitigate DDoS Attacks in Cloud Computing.
Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, 2015


  Loading...