RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data
暂无分享,去创建一个
Guangjun Liu | Yuanyuan Zhang | Xuan Li | Jinbo Xiong | Zhiqiang Yao | Mingwei Lin | Jinbo Xiong | Guangjun Liu | Mingwei Lin | Zhiqiang Yao | Yuanyuan Zhang | Xuan Li
[1] Honggang Wang,et al. Socially Aware Energy-Efficient Mobile Edge Collaboration for Video Distribution , 2017, IEEE Transactions on Multimedia.
[2] Chuan Qin,et al. The Design and Implementation of a Rekeying-Aware Encrypted Deduplication Storage System , 2017, ACM Trans. Storage.
[3] Benny Pinkas,et al. Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.
[4] Jianfeng Ma,et al. A full lifecycle privacy protection scheme for sensitive data in cloud computing , 2014, Peer-to-Peer Networking and Applications.
[5] Xingming Sun,et al. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.
[6] Lorena González-Manzano,et al. An efficient confidentiality-preserving Proof of Ownership for deduplication , 2015, J. Netw. Comput. Appl..
[7] Yuanyuan Zhang,et al. A novel role symmetric encryption algorithm for authorized deduplication in cloud , 2017 .
[8] Shigang Chen,et al. Two-Party Fine-Grained Assured Deletion of Outsourced Data in Cloud Systems , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems.
[9] Jeffrey S. Vetter,et al. A Survey Of Architectural Approaches for Data Compression in Cache and Main Memory Systems , 2016 .
[10] Jianfeng Ma,et al. Secure, efficient and revocable multi-authority access control system in cloud storage , 2016, Comput. Secur..
[11] Jin Li,et al. A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.
[12] Xuan Li,et al. A secure cloud storage system supporting privacy-preserving fuzzy deduplication , 2016, Soft Comput..
[13] Ali Miri,et al. Deduplication Practices for Multimedia Data in the Cloud , 2018 .
[14] Roberto Di Pietro,et al. Boosting efficiency and security in proof of ownership for deduplication , 2012, ASIACCS '12.
[15] Hyunsoo Kwon,et al. Secure deduplication for multimedia data with user revocation in cloud storage , 2017, Multimedia Tools and Applications.
[16] Benny Pinkas,et al. Proofs of ownership in remote storage systems , 2011, CCS '11.
[17] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[18] Xiaodong Liu,et al. A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment , 2016, Secur. Commun. Networks.
[19] Roberto Di Pietro,et al. A tunable proof of ownership scheme for deduplication using Bloom filters , 2014, 2014 IEEE Conference on Communications and Network Security.
[20] Enrico Zio,et al. A Bayesian Optimal Design for Accelerated Degradation Testing Based on the Inverse Gaussian Process , 2017, IEEE Access.
[21] Jianfeng Ma,et al. A privacy preserving three-factor authentication protocol for e-Health clouds , 2016, The Journal of Supercomputing.
[22] Xiaosong Zhang,et al. Information Leakage in Encrypted Deduplication via Frequency Analysis , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[23] Darrell D. E. Long,et al. Secure data deduplication , 2008, StorageSS '08.
[24] Mohammad Mannan,et al. An evaluation of recent secure deduplication proposals , 2016, J. Inf. Secur. Appl..
[25] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[26] Guangjun Liu,et al. Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data , 2014, Int. J. Netw. Secur..
[27] Hong Jiang,et al. A Comprehensive Study of the Past, Present, and Future of Data Deduplication , 2016, Proceedings of the IEEE.
[28] Xiong Jinbo,et al. Research progress on secure data deduplication in cloud , 2016 .
[29] Honggang Wang,et al. Node Service Ability Aware Packet Forwarding Mechanism in Intermittently Connected Wireless Networks , 2016, IEEE Transactions on Wireless Communications.
[30] Yuanyuan Zhang,et al. Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud Applications , 2017, ICCCS.
[31] Kim-Kwang Raymond Choo,et al. ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments , 2016, SecureComm.
[32] Roberto Di Pietro,et al. Proof of ownership for deduplication systems: A secure, scalable, and efficient solution , 2016, Comput. Commun..
[33] Jin Li,et al. Rekeying for Encrypted Deduplication Storage , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[34] Zhangjie Fu,et al. Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data , 2017, IEEE Transactions on Information Forensics and Security.
[35] Hui Li,et al. Secure multi-server-aided data deduplication in cloud computing , 2015, Pervasive Mob. Comput..
[36] Jenq-Shiou Leu,et al. Design and Implementation of Various File Deduplication Schemes on Storage Devices , 2015, 2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE).
[37] Jian Shen,et al. An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.
[38] Barbara F. Sharf. The Critic as Rhetor: Psychiatry and Fantasy Theme Analysis , 1987 .
[39] Li Lin,et al. ms‐PoSW: A multi‐server aided proof of shared ownership scheme for secure deduplication in cloud , 2017, Concurr. Comput. Pract. Exp..
[40] Honggang Wang,et al. Privacy-Preserving Multimedia Big Data Aggregation in Large-Scale Wireless Sensor Networks , 2016, ACM Trans. Multim. Comput. Commun. Appl..
[41] Sherali Zeadally,et al. Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks , 2017, IEEE Access.
[42] Honggang Wang,et al. An Energy-Efficient Data Forwarding Strategy for Heterogeneous WBANs , 2016, IEEE Access.