CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains
暂无分享,去创建一个
Xiaojiang Du | Sheng Liu | Feng Gao | Liehuang Zhu | Shu Yin | Meng Shen | Yandong Li | Baokun Zheng | Xiaojiang Du | Meng Shen | Liehuang Zhu | Baokun Zheng | Feng Gao | Sheng Liu | Yandong Li | Shu Yin
[1] Yang Tang,et al. NCCloud: applying network coding for the storage repair in a cloud-of-clouds , 2012, FAST.
[2] Xiaojiang Du,et al. Permission-combination-based scheme for Android mobile malware detection , 2014, 2014 IEEE International Conference on Communications (ICC).
[3] Benny Pinkas,et al. Secure Deduplication of Encrypted Data without Additional Independent Servers , 2015, CCS.
[4] Mingqiang Li,et al. CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal , 2015, IEEE Internet Computing.
[5] Ramakrishna Kotla,et al. SafeStore: A Durable and Practical Storage System , 2007, USENIX Annual Technical Conference.
[6] Guoqi Zhang,et al. More than Moore: Creating High Value Micro/Nanoelectronics Systems , 2009 .
[7] David Bermbach,et al. MetaStorage: A Federated Cloud Storage System to Manage Consistency-Latency Tradeoffs , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[8] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..
[9] Xiaojiang Du,et al. Security in wireless sensor networks , 2008, IEEE Wireless Communications.
[10] Zibin Zheng,et al. Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..
[11] Marvin Theimer,et al. Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[12] M. Mitchell Waldrop,et al. The chips are down for Moore’s law , 2016, Nature.
[13] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[14] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[15] Ethan Katz-Bassett,et al. SPANStore: cost-effective geo-replicated storage spanning multiple cloud services , 2013, SOSP.
[16] C. Sunitha,et al. A Study on Deduplication Techniques over Encrypted Data , 2016 .
[17] Dan Dobre,et al. Hybris: Robust Hybrid Cloud Storage , 2014, SoCC.
[18] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[19] Sugam Sharma,et al. Expanded cloud plumes hiding Big Data ecosystem , 2016, Future Gener. Comput. Syst..
[20] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[21] Jiankun Hu,et al. Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection , 2018, IEEE Transactions on Information Forensics and Security.
[22] Mihir Bellare,et al. DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.
[23] Juho Hamari,et al. The sharing economy: Why people participate in collaborative consumption , 2016, J. Assoc. Inf. Sci. Technol..
[24] Miguel Correia,et al. DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.
[25] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[26] Xiaojiang Du,et al. A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications , 2013, IEEE Sensors Journal.
[27] Xiaojiang Du,et al. Implementation and performance analysis of SNMP on a TLS/TCP base , 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470).
[28] Ghassan O. Karame,et al. Transparent Data Deduplication in the Cloud , 2015, CCS.