Cryptographic Hashing Method using for Secure and Similarity Detection in Distributed Cloud Data
暂无分享,去创建一个
S. K. Muthusundar | A. Mohamed Divan Masood | S. K. Muthusundar | Article Info | A. M. Masood | Dr. S.K. Muthusundar
[1] D. Helen,et al. Survey on Encryption Techniques used to Secure Cloud Storage System , 2015 .
[2] Harikesh Pandey,et al. Secure and Constant Cost Public Cloud Storage Auditing with Deduplication , 2017 .
[3] Jin Li,et al. Convergent Dispersal: Toward Storage-Efficient Security in a Cloud-of-Clouds , 2014, HotCloud.
[4] D. Arivazhagan,et al. Generating a Digital Signature Based on New Cryptographic Scheme for User Authentication and Security , 2014 .
[5] Alessandro Sorniotti,et al. A Secure Data Deduplication Scheme for Cloud Storage , 2014, Financial Cryptography.
[6] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.
[7] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[8] Reza Curtmola,et al. Remote data checking using provable data possession , 2011, TSEC.
[9] Zheng Yan,et al. A Scheme to Manage Encrypted Data Storage with Deduplication in Cloud , 2015, ICA3PP.