Hash‐balanced binary tree–based public auditing in vehicular edge computing and networks

[1]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[2]  Roberto Tamassia,et al.  Dynamic provable data possession , 2009, IACR Cryptol. ePrint Arch..

[3]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[4]  Xu Chen,et al.  Decentralized Computation Offloading Game for Mobile Cloud Computing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[5]  Khaled Ben Letaief,et al.  Mobile Edge Computing: Survey and Research Outlook , 2017, ArXiv.

[6]  Roy Want,et al.  Guest Editors' Introduction: Energy Harvesting and Conservation , 2005, IEEE Pervasive Comput..

[7]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[8]  Debiao He,et al.  Robust Biometrics-Based Authentication Scheme for Multiserver Environment , 2015, IEEE Systems Journal.

[9]  Albert Y. Zomaya,et al.  Computation Offloading for Service Workflow in Mobile Cloud Computing , 2015, IEEE Transactions on Parallel and Distributed Systems.

[10]  Meikang Qiu,et al.  A Scalable and Quick-Response Software Defined Vehicular Network Assisted by Mobile Edge Computing , 2017, IEEE Communications Magazine.

[11]  Sherali Zeadally,et al.  Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices , 2019, IEEE Systems Journal.

[12]  Zdenek Becvar,et al.  Mobile Edge Computing: A Survey on Architecture and Computation Offloading , 2017, IEEE Communications Surveys & Tutorials.

[13]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[14]  Bilin Shao,et al.  Dynamic Data Integrity Auditing Method Supporting Privacy Protection in Vehicular Cloud Environment , 2018, IEEE Access.

[15]  R. C. Hansdah,et al.  A Survey of Cloud Storage Facilities , 2011, 2011 IEEE World Congress on Services.

[16]  Fan Wu,et al.  A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things , 2018, IEEE Internet of Things Journal.

[17]  Leonidas J. Guibas,et al.  A dichromatic framework for balanced trees , 1978, 19th Annual Symposium on Foundations of Computer Science (sfcs 1978).

[18]  Chin-Chen Chang,et al.  Privacy-preserving public auditing for secure data storage in fog-to-cloud computing , 2019, J. Netw. Comput. Appl..

[19]  Xiong Li,et al.  Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks , 2017, Comput. Networks.

[20]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[21]  Albert Y. Zomaya,et al.  Remote Data Auditing in Cloud Computing Environments , 2015, ACM Comput. Surv..

[22]  Stephen S. Yau,et al.  Dynamic Audit Services for Outsourced Storages in Clouds , 2013, IEEE Transactions on Services Computing.

[23]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[24]  Xiong Li,et al.  A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments , 2018, J. Netw. Comput. Appl..

[25]  Chun Chen,et al.  Privacy-Preserving Universal Authentication Protocol for Wireless Communications , 2011, IEEE Transactions on Wireless Communications.

[26]  Rong Yu,et al.  Distributed Reputation Management for Secure and Efficient Vehicular Edge Computing and Networks , 2017, IEEE Access.

[27]  Xiong Li,et al.  Privacy Preserving Data Aggregation Scheme for Mobile Edge Computing Assisted IoT Applications , 2019, IEEE Internet of Things Journal.

[28]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[29]  Chunxiang Xu,et al.  Secure and efficient privacy-preserving public auditing scheme for cloud storage , 2014, Comput. Electr. Eng..

[30]  F. Richard Yu,et al.  Secure Data Sharing for Vehicular Ad-hoc Networks Using Cloud Computing , 2016, ADHOCNETS.

[31]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[32]  Jian Shen,et al.  An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.

[33]  Jin Liu,et al.  Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage , 2017, IEEE Transactions on Services Computing.

[34]  Yihua Zhang,et al.  Efficient dynamic provable possession of remote data via balanced update trees , 2013, ASIA CCS '13.

[35]  Sherali Zeadally,et al.  Vehicular delay-tolerant networks for smart grid data management using mobile edge computing , 2016, IEEE Communications Magazine.

[36]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[37]  Gerhard P. Fettweis,et al.  The Tactile Internet: Applications and Challenges , 2014, IEEE Vehicular Technology Magazine.

[38]  Sherali Zeadally,et al.  Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks , 2018, IEEE Systems Journal.

[39]  Baowen Xu,et al.  An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Information Forensics and Security.