SSDS-MC: Slice-based Secure Data Storage in Multi-Cloud Environment
暂无分享,去创建一个
Zhengguo Sheng | Peng Xu | Kai Shuang | Xuan Shan | Xiaqi Liu | Kai Shuang | Peng Xu | Xiaqi Liu | Zhengguo Sheng | Xuan Shan
[1] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[2] Raman Maini,et al. COMPARISON OF DATA ENCRYPTION ALGORITHMS , 2011 .
[3] Idit Keidar,et al. Venus: verification for untrusted cloud storage , 2010, CCSW '10.
[4] Miguel Correia,et al. DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.
[5] Min Chen,et al. Cloud-based Wireless Network: Virtualized, Reconfigurable, Smart Wireless Network to Enable 5G Technologies , 2015, Mob. Networks Appl..
[6] Yang Tang,et al. FADE: Secure Overlay Cloud Storage with File Assured Deletion , 2010, SecureComm.
[7] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.
[8] Sawan Kumar,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[9] J. P. Raina,et al. Comparative Analysis of AES and RC4 Algorithms for Better Utilization , 2011 .
[10] Mihir Bellare,et al. Optimal Asymmetric Encryption-How to Encrypt with RSA , 1995 .
[11] Zhao Peng-yuan. Analysis of critical technologies on cloud storage security , 2011 .
[12] Mihir Bellare,et al. A concrete security treatment of symmet-ric encryption: Analysis of the DES modes of operation , 1997, FOCS 1997.
[13] Alysson Neves Bessani,et al. DepSky: dependable and secure storage in a cloud-of-clouds , 2011, EuroSys '11.
[14] Simson L. Garfinkel,et al. An Evaluation of Amazon's Grid Computing Services: EC2, S3, and SQS , 2007 .
[15] Shusen Yang,et al. A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities , 2013, IEEE Wireless Communications.