External integrity verification for outsourced big data in cloud and IoT: A big picture
暂无分享,去创建一个
Jinjun Chen | Chang Liu | Xuyun Zhang | Chi Yang | Xuyun Zhang | Chi Yang | Chang Liu | Jinjun Chen
[1] Sameesha Vs. A Scalable Two Phase Top Down Specialization Approach For Data Anonymization Using Mapreduce On Cloud , 2017 .
[2] R. Ramesh,et al. A Survey on Public Auditing for Shared Data with Efficient User Revocation in the Cloud , 2016 .
[3] Yihua Zhang,et al. Efficient Dynamic Provable Possession of Remote Data via Update Trees , 2016, TOS.
[4] Jinjun Chen,et al. MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud , 2015, IEEE Transactions on Computers.
[5] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[6] Jinjun Chen,et al. HireSome-II: Towards Privacy-Aware Cross-Cloud Service Composition for Big Data Applications , 2015, IEEE Transactions on Parallel and Distributed Systems.
[7] Jinjun Chen,et al. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud , 2015, IEEE Transactions on Parallel and Distributed Systems.
[8] David Cash,et al. Dynamic Proofs of Retrievability Via Oblivious RAM , 2013, Journal of Cryptology.
[9] Jian Pei,et al. A spatiotemporal compression based approach for efficient big data processing on Cloud , 2014, J. Comput. Syst. Sci..
[10] Jinjun Chen,et al. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates , 2014, IEEE Transactions on Parallel and Distributed Systems.
[11] Jinjun Chen,et al. A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud , 2014, J. Comput. Syst. Sci..
[12] Fei Wang,et al. An Optimized Computational Model for Multi-Community-Cloud Social Collaboration , 2014, IEEE Transactions on Services Computing.
[13] Jinjun Chen,et al. KASR: A Keyword-Aware Service Recommendation Method on MapReduce for Big Data Applications , 2014, IEEE Transactions on Parallel and Distributed Systems.
[14] Hui Li,et al. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.
[15] Zoe L. Jiang,et al. Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.
[16] Elaine Shi,et al. Practical dynamic proofs of retrievability , 2013, CCS.
[17] Jinjun Chen,et al. An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud , 2013, J. Comput. Syst. Sci..
[18] Jinjun Chen,et al. An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[19] Ming Li,et al. Storing Shared Data on the Cloud via Security-Mediator , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.
[20] Jinjun Chen,et al. CCBKE - Session key negotiation for fast and secure scheduling of scientific applications in cloud computing , 2013, Future Gener. Comput. Syst..
[21] Jinjun Chen,et al. A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud , 2013, IEEE Transactions on Parallel and Distributed Systems.
[22] Elaine Shi,et al. Path ORAM: an extremely simple oblivious RAM protocol , 2012, CCS.
[23] Gail-Joon Ahn,et al. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.
[24] Xu Han,et al. An efficient index for massive IOT data in cloud environment , 2012, CIKM '12.
[25] Peter Williams,et al. PrivateFS: a parallel oblivious file system , 2012, CCS.
[26] Shigang Chen,et al. A dynamic Proof of Retrievability (PoR) scheme with O(logn) complexity , 2012, 2012 IEEE International Conference on Communications (ICC).
[27] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[28] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[29] Rajkumar Buyya,et al. Future Generation Computer Systems Deadline-driven Provisioning of Resources for Scientific Applications in Hybrid Clouds with Aneka , 2022 .
[30] XiaoFeng Wang,et al. Sedic: privacy-aware data intensive computing on hybrid clouds , 2011, CCS '11.
[31] Gregor von Laszewski,et al. Towards building a cloud for scientific applications , 2011, Adv. Eng. Softw..
[32] Jinhui Yao,et al. DIaaS: Data Integrity as a Service in the Cloud , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[33] Reza Curtmola,et al. Remote data checking using provable data possession , 2011, TSEC.
[34] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[35] A. Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[36] John Zic,et al. TrustStore: Making Amazon S3 Trustworthy with Services Composition , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.
[37] Juhnyoung Lee,et al. A view of cloud computing , 2010, CACM.
[38] Alptekin Küpçü,et al. Efficient Cryptography for the Next Generation Secure Cloud , 2010 .
[39] Gerd Kortuem,et al. Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.
[40] Jonathan Katz,et al. Proofs of Storage from Homomorphic Identification Protocols , 2009, ASIACRYPT.
[41] Charalampos Papamanthou,et al. Dynamic provable data possession , 2009, IACR Cryptol. ePrint Arch..
[42] Lizhe Wang,et al. Scientific Cloud Computing: Early Definition and Experience , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[43] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[44] Reza Curtmola,et al. MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[45] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[46] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[47] D. Boneh,et al. Short Signatures from the Weil Pairing , 2001, Journal of Cryptology.
[48] Dawn Xiaodong Song,et al. Homomorphic Signature Schemes , 2002, CT-RSA.
[49] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.