Merkle Tree and Blockchain-Based Cloud Data Auditing

[1]  Xiaohua Jia,et al.  Improving the proof of “Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms” , 2019, PloS one.

[2]  P. Varalakshmi,et al.  A review on public auditing in cloud environment , 2016, 2016 International Conference on Information Communication and Embedded Systems (ICICES).

[3]  Xiaojun Zhang,et al.  Identity-based key-exposure resilient cloud storage public auditing scheme from lattices , 2019, Inf. Sci..

[4]  Hoon Ko A Study on Secure Contents Strategies for Applications With DRM on Cloud Computing , 2018, Int. J. Cloud Appl. Comput..

[5]  Yu Cheng,et al.  A Distributed Secure Outsourcing Scheme for Solving Linear Algebraic Equations in Ad Hoc Clouds , 2015, IEEE Transactions on Cloud Computing.

[6]  P. Varalakshmi,et al.  Enabling Ternary Hash Tree Based Integrity Verification for Secure Cloud Data Storage , 2020, IEEE Transactions on Knowledge and Data Engineering.

[7]  Xiaojun Zhang,et al.  SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System , 2015, IACR Cryptol. ePrint Arch..

[8]  Brij B. Gupta,et al.  Auditing Defense against XSS Worms in Online Social Network-Based Web Applications , 2016 .

[9]  Xuemin Sherman Shen,et al.  Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors , 2019, IEEE Transactions on Cloud Computing.

[10]  Albert Y. Zomaya,et al.  Auditing Big Data Storage in Cloud Computing Using Divide and Conquer Tables , 2018, IEEE Transactions on Parallel and Distributed Systems.

[11]  Xiaojun Zhang,et al.  SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors , 2015, IEEE Transactions on Computational Social Systems.

[12]  Xiaohui Liang,et al.  Cryptographic Public Verification of Data Integrity for Cloud Storage Systems , 2016, IEEE Cloud Computing.

[13]  Akashdeep Bhardwaj,et al.  Efficient Fault Tolerance on Cloud Environments , 2018, Int. J. Cloud Appl. Comput..

[14]  Kostas E. Psannis,et al.  Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..

[15]  Mohammed Ouzzif,et al.  A Novel Security Framework for Managing Android Permissions Using Blockchain Technology , 2018, Int. J. Cloud Appl. Comput..

[16]  Robert Anderson Keith Duncan,et al.  Enhancing Cloud Security and Privacy: The Cloud Audit Problem , 2016, CLOUD 2016.

[17]  Jun Hu,et al.  Security Issues in Online Social Networks , 2011, IEEE Internet Computing.

[18]  Rosni Abdullah,et al.  DNS rule-based schema to botnet detection , 2019, Enterp. Inf. Syst..

[19]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[20]  Cong Wang,et al.  Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).