External integrity verification for outsourced big data in cloud and IoT: A big picture

[1]  Sameesha Vs A Scalable Two Phase Top Down Specialization Approach For Data Anonymization Using Mapreduce On Cloud , 2017 .

[2]  R. Ramesh,et al.  A Survey on Public Auditing for Shared Data with Efficient User Revocation in the Cloud , 2016 .

[3]  Yihua Zhang,et al.  Efficient Dynamic Provable Possession of Remote Data via Update Trees , 2016, TOS.

[4]  Jinjun Chen,et al.  MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud , 2015, IEEE Transactions on Computers.

[5]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[6]  Jinjun Chen,et al.  HireSome-II: Towards Privacy-Aware Cross-Cloud Service Composition for Big Data Applications , 2015, IEEE Transactions on Parallel and Distributed Systems.

[7]  Jinjun Chen,et al.  A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud , 2015, IEEE Transactions on Parallel and Distributed Systems.

[8]  David Cash,et al.  Dynamic Proofs of Retrievability Via Oblivious RAM , 2013, Journal of Cryptology.

[9]  Jian Pei,et al.  A spatiotemporal compression based approach for efficient big data processing on Cloud , 2014, J. Comput. Syst. Sci..

[10]  Jinjun Chen,et al.  Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates , 2014, IEEE Transactions on Parallel and Distributed Systems.

[11]  Jinjun Chen,et al.  A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud , 2014, J. Comput. Syst. Sci..

[12]  Fei Wang,et al.  An Optimized Computational Model for Multi-Community-Cloud Social Collaboration , 2014, IEEE Transactions on Services Computing.

[13]  Jinjun Chen,et al.  KASR: A Keyword-Aware Service Recommendation Method on MapReduce for Big Data Applications , 2014, IEEE Transactions on Parallel and Distributed Systems.

[14]  Hui Li,et al.  Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[15]  Zoe L. Jiang,et al.  Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.

[16]  Elaine Shi,et al.  Practical dynamic proofs of retrievability , 2013, CCS.

[17]  Jinjun Chen,et al.  An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud , 2013, J. Comput. Syst. Sci..

[18]  Jinjun Chen,et al.  An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[19]  Ming Li,et al.  Storing Shared Data on the Cloud via Security-Mediator , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.

[20]  Jinjun Chen,et al.  CCBKE - Session key negotiation for fast and secure scheduling of scientific applications in cloud computing , 2013, Future Gener. Comput. Syst..

[21]  Jinjun Chen,et al.  A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud , 2013, IEEE Transactions on Parallel and Distributed Systems.

[22]  Elaine Shi,et al.  Path ORAM: an extremely simple oblivious RAM protocol , 2012, CCS.

[23]  Gail-Joon Ahn,et al.  Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.

[24]  Xu Han,et al.  An efficient index for massive IOT data in cloud environment , 2012, CIKM '12.

[25]  Peter Williams,et al.  PrivateFS: a parallel oblivious file system , 2012, CCS.

[26]  Shigang Chen,et al.  A dynamic Proof of Retrievability (PoR) scheme with O(logn) complexity , 2012, 2012 IEEE International Conference on Communications (ICC).

[27]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[28]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.

[29]  Rajkumar Buyya,et al.  Future Generation Computer Systems Deadline-driven Provisioning of Resources for Scientific Applications in Hybrid Clouds with Aneka , 2022 .

[30]  XiaoFeng Wang,et al.  Sedic: privacy-aware data intensive computing on hybrid clouds , 2011, CCS '11.

[31]  Gregor von Laszewski,et al.  Towards building a cloud for scientific applications , 2011, Adv. Eng. Softw..

[32]  Jinhui Yao,et al.  DIaaS: Data Integrity as a Service in the Cloud , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[33]  Reza Curtmola,et al.  Remote data checking using provable data possession , 2011, TSEC.

[34]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[35]  A. Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[36]  John Zic,et al.  TrustStore: Making Amazon S3 Trustworthy with Services Composition , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.

[37]  Juhnyoung Lee,et al.  A view of cloud computing , 2010, CACM.

[38]  Alptekin Küpçü,et al.  Efficient Cryptography for the Next Generation Secure Cloud , 2010 .

[39]  Gerd Kortuem,et al.  Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.

[40]  Jonathan Katz,et al.  Proofs of Storage from Homomorphic Identification Protocols , 2009, ASIACRYPT.

[41]  Charalampos Papamanthou,et al.  Dynamic provable data possession , 2009, IACR Cryptol. ePrint Arch..

[42]  Lizhe Wang,et al.  Scientific Cloud Computing: Early Definition and Experience , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[43]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[44]  Reza Curtmola,et al.  MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[45]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[46]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[47]  D. Boneh,et al.  Short Signatures from the Weil Pairing , 2001, Journal of Cryptology.

[48]  Dawn Xiaodong Song,et al.  Homomorphic Signature Schemes , 2002, CT-RSA.

[49]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.