M. Abadi and C. Fournet, Mobile values, new names, and secure communication, In ACM SIGPLAN Notices, vol.36, pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

C. Adams, P. Cain, D. Pinkas, and R. Zuccherato, , 2001.

M. A. Alsmirat, Y. Jararweh, I. Obaidat, and B. B. Gupta, Internet of surveillance: a cloud supported large-scale wireless surveillance system, The Journal of Supercomputing, vol.73, issue.3, pp.973-992, 2017.

C. Bansal, K. Bhargavan, A. Delignat-lavaud, and S. Maffeis, Keys to the cloud: Formal analysis and concrete attacks on encrypted web storage, International Conference on Principles of Security and Trust, pp.126-146, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00863375

S. Belguith, N. Kaaniche, A. Jemai, M. Laurent, A. et al., Pabac: a privacy preserving attribute based framework for fine grained access control in clouds, SECRYPT 2016: 13th International Conference on Security and Cryptography, vol.4, pp.133-146, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01391253

M. Berrima, P. Lafourcade, M. Giraud, and N. B. Rajeb, Formal analyze of a private access control protocol to a cloud storage, SECRYPT 2017: 14th International Conference on Security and Cryptography, vol.4, pp.495-500, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01689790

B. Blanchet, Automatic proof of strong secrecy for security protocols, Proceedings. 2004 IEEE Symposium on, pp.86-100, 2004.

B. Blanchet, Automatic verification of correspondences for security protocols, J. Comput. Secur, vol.17, issue.4, pp.363-434, 2009.

B. Blanchet, M. Abadi, and C. Fournet, Automated verification of selected equivalences for security protocols, The Journal of Logic and Algebraic Programming, vol.75, issue.1, pp.3-51, 2008.

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, CSFW, vol.1, 2001.

B. Blanchet and B. Smyth, Automated reasoning for equivalences in the applied pi calculus with barriers, CSF'16, pp.310-324, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01423742

X. Boyen, Mesh signatures, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.210-227, 2007.

D. Chaum and E. Van-heyst, Group signatures, Workshop on the Theory and Application of of Cryptographic Techniques, pp.257-265, 1991.

X. Chen, G. Lenzini, S. Mauw, and J. Pang, Design and formal analysis of a group signature based electronic toll pricing system, JoWUA, vol.4, issue.1, pp.55-75, 2013.

R. Cramer, I. Damgård, and B. Schoenmakers, Proofs of partial knowledge and simplified design of witness hiding protocols, Annual International Cryptology Conference, pp.174-187, 1994.

C. J. Cremers, P. Lafourcade, and P. Nadeau, Comparing state spaces in automatic security protocol analysis, Formal to Practical Security-Papers Issued from the 2005-2008 French-Japanese Collaboration, pp.70-94, 2009.
URL : https://hal.archives-ouvertes.fr/hal-01759940

M. Dahshan and S. Elkassass, Framework for securing data in cloud storage services, Security and Cryptography (SECRYPT), pp.1-8, 2014.

S. Delaune, S. Kremer, M. D. Ryan, and G. Steel, A formal analysis of authentication in the tpm, In International Workshop on Formal Aspects in Security and Trust, pp.111-125, 2010.

M. Giraud, A. Anzala-yamajako, O. Bernard, L. , and P. , Practical passive leakage-abuse attacks against symmetric searchable encryption, 2009.
URL : https://hal.archives-ouvertes.fr/hal-01689780

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, ACM CCS'06, 2006.

A. Grover and B. Kaur, A framework for cloud data security, Computing, Communication and Automation (ICCCA), 2016 International Conference on, pp.1199-1203, 2016.

S. Hosseinzadeh, S. Laurén, S. Rauti, S. Hyrynsalmi, M. Conti et al., Obfuscation and diversification for securing cloud computing, Enterprise Security, pp.179-202, 2017.

H. Huang, S. Guo, J. Wu, L. , and J. , Service chaining for hybrid network function, IEEE Transactions on Cloud Computing, 2017.

M. Ibtihal and N. Hassan, Homomorphic encryption as a service for outsourced images in mobile cloud computing environment, International Journal of Cloud Applications and Computing (IJCAC), vol.7, issue.2, pp.27-40, 2017.

S. Kremer and M. Ryan, Analysis of an electronic voting protocol in the applied pi calculus, European Symposium on Programming, pp.186-200, 2005.

A. Lewko and B. Waters, Decentralizing attribute-based encryption, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.568-588, 2011.

M. Li, S. Yu, K. Ren, L. , and W. , Securing personal health records in cloud computing: Patientcentric and fine-grained data access control in multiowner settings, International Conference on Security and Privacy in Communication Systems, pp.89-106, 2010.

H. K. Maji, M. Prabhakaran, R. , and M. , , 2008.

, Attribute-based signatures: Achieving attribute-privacy and collusion-resistance, IACR Cryptology ePrint Archive, p.328, 2008.

V. A. Memos, K. E. Psannis, Y. Ishibashi, B. G. Kim, and B. Gupta, An efficient algorithm for media-based surveillance system (eamsus) in iot smart city framework, Future Generation Computer Systems, 2017.

M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, and E. Weippl, Dark clouds on the horizon: Using cloud storage as attack vector and online slack space, Proceedings of the 20th USENIX Conference on Security, p.11, 2011.

M. Puys and P. Lafourcade, Evaluations of cryptographic protocols: Verification tools dealing with algebraic properties, Foundations and Practice of Security-FPS 2015, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01306395

M. Puys, M. Potet, L. , and P. , Formal analysis of security properties on the opcua scada protocol, International Conference on Computer Safety, Reliability, and Security, pp.67-75, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01366059

R. L. Rivest, A. Shamir, and Y. Tauman, How to leak a secret, International Conference on the Theory and Application of Cryptology and Information Security, pp.552-565, 2001.

S. Ruj, M. Stojmenovic, and A. Nayak, Privacy preserving access control with authentication for securing data in clouds, Cluster, Cloud and author Grid Computing (CCGrid), 2012 12th IEEE/ACM International Symposium on, pp.556-563, 2012.

A. Sahai and B. Waters, Fuzzy identity-based encryption, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.457-473, 2005.

B. Shakunthala, N. Kavya, K. S. Kg, C. Sahana, and K. G. Shetraradder, Decentralized access control with anonymous authentication of data stored in clouds, 2017.

C. Stergiou, K. E. Psannis, B. Kim, and B. Gupta, Secure integration of iot and cloud computing, Future Generation Computer Systems, 2016.

Z. Tang, X. Wang, L. Jia, X. Zhang, M. et al., Study on data security of cloud computing, 2012 Spring Congress on, pp.1-3, 2012.

B. Y. Wang, J. Ming, S. M. Zhang, H. Jiang, and H. Luo, An access control method based on cp-abe and abs algorithm in cloud storage, In Applied Mechanics and Materials, vol.644, pp.1919-1922, 2014.

C. Wang, K. Ren, W. Lou, L. , and J. , Toward publicly auditable secure cloud data storage services, IEEE Network, vol.24, issue.4, pp.19-24, 2010.

K. Yang and X. Jia, Attributed-based access control for multi-authority systems in cloud storage, Distributed Computing Systems (ICDCS), pp.536-545, 2012.

K. Yang and X. Jia, Expressive, efficient, and revocable data access control for multi-authority cloud storage, IEEE transactions on parallel and distributed systems, vol.25, pp.1735-1744, 2014.

T. Ylonen and C. Lonvick, The secure shell (ssh) authentication protocol, 2006.

S. Yu, C. Wang, K. Ren, L. , and W. , Attribute based data sharing with attribute revocation, Proceedings of the 5th ACM Symposium on Information, 2010.

G. Zhang, Y. Yang, X. Zhang, C. Liu, C. et al., Key research issues for privacy protection and preservation in cloud computing, Second International Conference on Cloud and Green Computing, CGC'12, pp.47-54, 2012.

K. Zkik, G. Orhanou, and S. Hajji, Secure mobile multi cloud architecture for authentication and data storage, International Journal of Cloud Applications and Computing (IJCAC), vol.7, issue.2, pp.62-76, 2017.