Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing
暂无分享,去创建一个
Yinghui Zhang | Qinglan Zhao | Dong Zheng | Haonan Su | Fang Ren | Menglei Yang | Yinghui Zhang | Qinglan Zhao | Dong Zheng | Haonan Su | Fang Ren | Menglei Yang
[1] Jin Li,et al. Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks , 2014, Comput. Networks.
[2] Hao Wang,et al. New directly revocable attribute-based encryption scheme and its application in cloud storage environment , 2016, Cluster Computing.
[3] Rui Guo,et al. A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience , 2018, Secur. Commun. Networks.
[4] Lei Chen,et al. Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT , 2019, IEEE Internet of Things Journal.
[5] Sherman S. M. Chow,et al. Towards Proofs of Ownership Beyond Bounded Leakage , 2016, ProvSec.
[6] Benny Pinkas,et al. Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.
[7] Jin Li,et al. Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing , 2017, Inf. Sci..
[8] Jianfeng Ma,et al. New Publicly Verifiable Databases with Efficient Updates , 2015, IEEE Transactions on Dependable and Secure Computing.
[9] Chunyi Peng,et al. An empirical analysis of similarity in virtual machine images , 2011, Middleware '11.
[10] Rui Guo,et al. Fine-Grained Access Control Systems Suitable for Resource-Constrained Users in Cloud Computing , 2018, Comput. Informatics.
[11] Marvin Theimer,et al. Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[12] H. Li,et al. Identity-based construction for secure and efficient handoff authentication schemes in wireless networks , 2012, Secur. Commun. Networks.
[13] Tao Jiang,et al. Secure and Efficient Cloud Data Deduplication With Randomized Tag , 2017, IEEE Transactions on Information Forensics and Security.
[14] Robert H. Deng,et al. Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing , 2018, IEEE Transactions on Services Computing.
[15] Guangjun Liu,et al. RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data , 2017, Mobile Networks and Applications.
[16] A. Broder. Some applications of Rabin’s fingerprinting method , 1993 .
[17] Jie Zhang,et al. Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds , 2017, Secur. Commun. Networks.
[18] Hyunsoo Kwon,et al. Scalable and Reliable Key Management for Secure Deduplication in Cloud Storage , 2017, 2017 IEEE 10th International Conference on Cloud Computing (CLOUD).
[19] Ning Ye,et al. Private and Secured Medical Data Transmission and Analysis for Wireless Sensing Healthcare System , 2017, IEEE Transactions on Industrial Informatics.
[20] Jianfeng Ma,et al. Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.
[21] Yinghui Zhang,et al. Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice , 2018, J. Netw. Comput. Appl..
[22] Robert H. Deng,et al. Blockchain based efficient and robust fair payment for outsourcing services in cloud computing , 2018, Inf. Sci..
[23] Sean Wang. Use of GPU architecture to optimize Rabin fingerprint data chunking algorithm by concurrent programming , 2016 .
[24] Robert H. Deng,et al. TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain , 2018, IEEE Access.
[25] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.
[26] Chen Chen,et al. Efficient and secure big data storage system with leakage resilience in cloud computing , 2018, Soft Comput..
[27] Xingming Sun,et al. Dynamic Resource Allocation for Load Balancing in Fog Environment , 2018, Wirel. Commun. Mob. Comput..
[28] Jin Li,et al. A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.
[29] Ting Wu,et al. Generating stable biometric keys for flexible cloud computing authentication using finger vein , 2016, Inf. Sci..
[30] Jiangang Shu,et al. Comments on “A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing” , 2019, IEEE Internet of Things Journal.
[31] M. Shruthi,et al. Secure Distributed Deduplication Systems with Improved Reliability , 2016 .
[32] Xuan Li,et al. A secure cloud storage system supporting privacy-preserving fuzzy deduplication , 2016, Soft Comput..
[33] Benny Pinkas,et al. Proofs of ownership in remote storage systems , 2011, CCS '11.
[34] Jin Li,et al. Rekeying for Encrypted Deduplication Storage , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[35] Yinghui Zhang,et al. Efficient and privacy-aware attribute-based data sharing in mobile cloud computing , 2017, Journal of Ambient Intelligence and Humanized Computing.
[36] Jin Li,et al. Anonymous attribute-based proxy re-encryption for access control in cloud computing , 2016, Secur. Commun. Networks.
[37] Jin Li,et al. Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing , 2016, Secur. Commun. Networks.
[38] Yunhao Liu,et al. Towards Network-level Efficiency for Cloud Storage Services , 2014, Internet Measurement Conference.
[39] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[40] Christian Esposito,et al. Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory , 2016, IEEE Transactions on Computers.
[41] David W. Chadwick,et al. Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker , 2017, Secur. Commun. Networks.
[42] Martín Abadi,et al. Message-Locked Encryption for Lock-Dependent Messages , 2013, IACR Cryptol. ePrint Arch..
[43] G. Kalpana,et al. Secure Auditing and Deduplicating Data in Cloud , 2016 .
[44] Brian D. Noble,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Pastiche: Making Backup Cheap and Easy , 2022 .
[45] Chunming Tang,et al. Privacy-preserving face recognition with outsourced computation , 2016, Soft Comput..
[46] Robert H. Deng,et al. Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control , 2018, IEEE Internet of Things Journal.
[47] Qi Han,et al. Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks , 2012, NSS.
[48] Yinghui Zhang,et al. An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting in Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[49] Jin Li,et al. Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..
[50] Jianfeng Ma,et al. A remotely keyed file encryption scheme under mobile cloud computing , 2018, J. Netw. Comput. Appl..