Merkle Tree and Blockchain-Based Cloud Data Auditing
暂无分享,去创建一个
Angelin Gladston | Arun Prasad Mohan | R. MohamedAsfak | Angelin Gladston | A. Mohan | R. MohamedAsfak
[1] Xiaohua Jia,et al. Improving the proof of “Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms” , 2019, PloS one.
[2] P. Varalakshmi,et al. A review on public auditing in cloud environment , 2016, 2016 International Conference on Information Communication and Embedded Systems (ICICES).
[3] Xiaojun Zhang,et al. Identity-based key-exposure resilient cloud storage public auditing scheme from lattices , 2019, Inf. Sci..
[4] Hoon Ko. A Study on Secure Contents Strategies for Applications With DRM on Cloud Computing , 2018, Int. J. Cloud Appl. Comput..
[5] Yu Cheng,et al. A Distributed Secure Outsourcing Scheme for Solving Linear Algebraic Equations in Ad Hoc Clouds , 2015, IEEE Transactions on Cloud Computing.
[6] P. Varalakshmi,et al. Enabling Ternary Hash Tree Based Integrity Verification for Secure Cloud Data Storage , 2020, IEEE Transactions on Knowledge and Data Engineering.
[7] Xiaojun Zhang,et al. SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System , 2015, IACR Cryptol. ePrint Arch..
[8] Brij B. Gupta,et al. Auditing Defense against XSS Worms in Online Social Network-Based Web Applications , 2016 .
[9] Xuemin Sherman Shen,et al. Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors , 2019, IEEE Transactions on Cloud Computing.
[10] Albert Y. Zomaya,et al. Auditing Big Data Storage in Cloud Computing Using Divide and Conquer Tables , 2018, IEEE Transactions on Parallel and Distributed Systems.
[11] Xiaojun Zhang,et al. SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors , 2015, IEEE Transactions on Computational Social Systems.
[12] Xiaohui Liang,et al. Cryptographic Public Verification of Data Integrity for Cloud Storage Systems , 2016, IEEE Cloud Computing.
[13] Akashdeep Bhardwaj,et al. Efficient Fault Tolerance on Cloud Environments , 2018, Int. J. Cloud Appl. Comput..
[14] Kostas E. Psannis,et al. Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..
[15] Mohammed Ouzzif,et al. A Novel Security Framework for Managing Android Permissions Using Blockchain Technology , 2018, Int. J. Cloud Appl. Comput..
[16] Robert Anderson Keith Duncan,et al. Enhancing Cloud Security and Privacy: The Cloud Audit Problem , 2016, CLOUD 2016.
[17] Jun Hu,et al. Security Issues in Online Social Networks , 2011, IEEE Internet Computing.
[18] Rosni Abdullah,et al. DNS rule-based schema to botnet detection , 2019, Enterp. Inf. Syst..
[19] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[20] Cong Wang,et al. Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).