You are on page 1of 3

LITERATURE SURVEY

Author Year Title Methodology Advantage Disadvantage

Haojin 2013 Security and privacy cheating Better it did not support
Zhu, privacy for storage discouragement and effectiveness public auditability.
Zhenfu and computation in secure computation and efficiency.
Cao, cloud computing auditing protocol
Xiaolei
Dong,
Weiwei
Jia,

Dan Chen, 2013 Fast and Scalable PARAFAC method Effective in the This certainly
Xiaoli Li, Multi-way has been epilepsy state results in loss or
Lizhe Analysis of Neural developed, which is detection. destruction of the
Wang, Data supported by Explicitly interactions
Samee U. general-purpose identifies the between the modes
Khan, computing on propagation of and further
the graphics neural activities understandings of
processing unit among various the underlying
(GPGPU) brain regions. processes in brain is
hampered.
LITERATURE SURVEY
Author Year Title Methodology Advantage Disadvantage

Abdul 2013 Incremental proxy incremental Energy Encryption and


NasirKhan re-encryption version of proxy re- consumption, decryption, are
· scheme for mobile encryption scheme CPU utilization, executed using
M. L. Mat cloud computing and memory the limited
Kiah· environment consumption computational
Security power of mobile
Sajjad A. operations on device.
Madani mobile device.

Yi-Ruei 2012 Efficient and RSA-based GKM Secure A member


Chen Provably-Secure scheme. based on the does not update the
Group Key pseudorandom keys assigned to
Wen- Management Efficient and function family him after he joined
Guey Scheme Using provably-secure assumption and the system.
Tzeng Key Derivation GKM scheme one-way
using the key property of a
derivation method. hash function
LITERATURE SURVEY
Author Year Title Methodology Advantage Disadvantage

Lei Xu· 2012 CL-PRE: a CL-PRE, a CL-PRE Encryption makes it


Certificateless certificateless proxy schemes difficult for
Xiaoxin Proxy Re- re-encryption and evaluate flexibly sharing
Wu. Encryption scheme for secure their security data between
Scheme data sharing with and different users.
Xinwen for Secure Data public cloud. performance.
Zhang Sharing with
Public Cloud

Seung- 2014 An Efficient Mediated Assure the Here could not


Hyun Seo Certificateless certificateless confidentiality solve the key
Encryption for public key of data stored in revocation problem.
Mohamed Secure encryption (mCL- public clouds In public key
Y oosuf Data Sharing in PKE) while enforcing cryptography, we
Mohamed Public Clouds access control should consider
Nabeel requirements. scenarios
compromised.
Elisa
Bertino

You might also like