Efficient data integrity auditing for storage security in mobile health cloud
暂无分享,去创建一个
Jian Shen | Yongjun Ren | Yuhui Zheng | Jin Wang | Han-Chieh Chao | H. Chao | Jian Shen | Yuhui Zheng | Yongjun Ren | Jin Wang
[1] Miguel Correia,et al. DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.
[2] M. Bhaskar,et al. Public Auditing For Shared Data With Efficient User Revocation In The Cloud , 2015 .
[3] Moni Naor,et al. The Complexity of Online Memory Checking , 2005, FOCS.
[4] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[5] Xiaohua Jia,et al. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.
[6] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[7] Jin Wang,et al. An Efficient Verifiably Encrypted Signature from Weil Pairing , 2013 .
[8] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[9] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[10] Xingming Sun,et al. Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..
[11] Nenghai Yu,et al. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.
[12] Shucheng Yu,et al. Proofs of retrievability with public verifiability and constant communication cost in cloud , 2013, Cloud Computing '13.
[13] Jonathan Katz,et al. Proofs of Storage from Homomorphic Identification Protocols , 2009, ASIACRYPT.
[14] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[15] Samee Ullah Khan,et al. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 , 2008 .
[16] Sanjay P. Ahuja,et al. A Survey of the State of Cloud Computing in Healthcare , 2012, Netw. Commun. Technol..
[17] Ejaz Ahmed,et al. A review on remote data auditing in single cloud server: Taxonomy and open issues , 2014, J. Netw. Comput. Appl..
[18] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[19] Faliu Yi,et al. A Multispectral Photon-Counting Double Random Phase Encoding Scheme for Image Authentication , 2014, Sensors.
[20] M. Phil,et al. PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .
[21] Yue Yin,et al. Mobility based energy efficient and multi-sink algorithms for consumer home networks , 2013, IEEE Transactions on Consumer Electronics.
[22] Feng Xia,et al. An Energy Efficient Stable Election-Based Routing Algorithm for Wireless Sensor Networks , 2013, Sensors.
[23] Shouhuai Xu,et al. Fair and dynamic proofs of retrievability , 2011, CODASPY '11.
[24] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[25] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[26] Bin Gu,et al. Feasibility and Finite Convergence Analysis for Accurate On-Line $\nu$-Support Vector Machine , 2013, IEEE Transactions on Neural Networks and Learning Systems.