SSM: Secure-Split-Merge data distribution in cloud infrastructure
暂无分享,去创建一个
Nurul Fariza Zulkurnain | Asifa Mehraj Baba | Rashidah F. Olanrewaju | Sajad Ahmad Lone | Burhan Ul Islam Khan
[1] Sowmiya Murthy,et al. CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY , 2014, SOCO 2014.
[2] Yang Tang,et al. FADE: Secure Overlay Cloud Storage with File Assured Deletion , 2010, SecureComm.
[3] Hao Wu,et al. Secure sensitive data sharing on a big data platform , 2015 .
[4] Helen J. Wang,et al. Enabling Security in Cloud Storage SLAs with CloudProof , 2011, USENIX ATC.
[5] Miguel Correia,et al. DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.
[6] Alessandro Sorniotti,et al. A Secure Data Deduplication Scheme for Cloud Storage , 2014, Financial Cryptography.
[7] Wei Ren,et al. Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing , 2011 .
[8] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[9] Marina Blanton,et al. Deniable cloud storage: sharing files via public-key deniability , 2010, WPES '10.
[10] Lucio Grandinetti,et al. Pervasive Cloud Computing Technologies: Future Outlooks and Interdisciplinary Perspectives , 2013 .
[11] Zhenyu Yang,et al. LT codes-based secure and reliable cloud storage service , 2012, 2012 Proceedings IEEE INFOCOM.
[12] Charalampos Papamanthou,et al. CS2: A Searchable Cryptographic Cloud Storage System , 2011 .
[13] Wei Huang,et al. Unity: secure and durable personal cloud storage , 2012, CCSW '12.
[14] Audu Jonathan Adoga,et al. Criteria for Choosing An Effective Cloud Storage Provider , 2014 .
[15] Yonggang Wen,et al. Towards end-to-end secure content storage and delivery with public cloud , 2012, CODASPY '12.
[16] A. Rama Mohan Reddy,et al. Investigational Analysis of Security Measures Effectiveness in Cloud Computing: A Study , 2014 .