Comparative study of encryption algorithm over big data in cloud systems
暂无分享,去创建一个
[1] Chen Li,et al. Inside "Big Data management": ogres, onions, or parfaits? , 2012, EDBT '12.
[2] N. Cao,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[3] Sanjay Ghemawat,et al. MapReduce: a flexible data processing tool , 2010, CACM.
[4] Sihem Amer-Yahia,et al. Proceedings of the 15th International Conference on Extending Database Technology , 2010, EDBT 2012.
[5] Behrouz A. Forouzan,et al. Data Communications and Networking , 2000 .
[6] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[7] Roberto J. Bayardo,et al. Data privacy through optimal k-anonymization , 2005, 21st International Conference on Data Engineering (ICDE'05).
[8] Philip S. Yu,et al. Anonymizing Classification Data for Privacy Preservation , 2007, IEEE Transactions on Knowledge and Data Engineering.
[9] Ritu Pahal. Efficient Implementation of AES , 2013 .
[10] Jinjun Chen,et al. A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud , 2013, IEEE Transactions on Parallel and Distributed Systems.
[11] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[12] Kuldeep Singh,et al. Efficiency and Security of Data with Symmetric Encryption Algorithms , 2012 .
[13] Yang Xiao,et al. Accountable MapReduce in cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).