Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security
暂无分享,去创建一个
Jian Shen | Anxi Wang | Dengzhi Liu | Tianqi Zhou | Pandi Vijayakumar | Dengzhi Liu | Jian Shen | P. Vijayakumar | Anxi Wang | Tianqi Zhou
[1] Jon Louis Bentley,et al. Multidimensional Binary Search Trees in Database Applications , 1979, IEEE Transactions on Software Engineering.
[2] Jiawei Han,et al. Selective Materialization: An Efficient Method for Spatial Data Cube Construction , 1998, PAKDD.
[3] P. S. Grover,et al. Multimedia Security Gateway Protocol to achieve anonymity in delivering multimedia data using watermarking , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).
[4] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[5] Jiun-In Guo,et al. EURASIP Journal on Applied Signal Processing 2003:13, 1291–1305 c ○ 2003 Hindawi Publishing Corporation Design and Realization of a New Signal Security System for Multimedia Data Transmission , 2003 .
[6] Byung-Ha Ahn,et al. More on the multimedia data security for e-commerce , 2003, International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003..
[7] Kian-Lee Tan,et al. Authenticating query results in edge computing , 2004, Proceedings. 20th International Conference on Data Engineering.
[8] Sandro Bimonte,et al. Towards a spatial multidimensional model , 2005, DOLAP '05.
[9] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[10] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[11] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, ASIACRYPT.
[12] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[13] Xiaohua Jia,et al. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.
[14] Asif Ullah Khan,et al. Proposed Method for Multimedia Data Security Using Cyclic Elliptic Curve, Chaotic System, and Authentication Using Neural Network , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.
[15] Xinyi Huang,et al. Provably Secure Group Key Management Approach Based upon Hyper-Sphere , 2014, IEEE Transactions on Parallel and Distributed Systems.
[16] Robert John Walters,et al. The second international workshop on enterprise security , 2015 .
[17] Kye-Dong Jung,et al. Data access control method for multimedia content data sharing and security based on XMDR-DAI in mobile cloud storage , 2016, Multimedia Tools and Applications.
[18] Xinyi Huang,et al. Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing , 2016, IEEE Transactions on Computers.
[19] Chih-Hsien Hsia,et al. Finger-vein recognition based on parametric-oriented corrections , 2016, Multimedia Tools and Applications.
[20] Chen Xiao,et al. A Multi-level Intelligent Selective Encryption Control Model for Multimedia Big Data Security in Sensing System with Resource Constraints , 2016, 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud).
[21] Weisong Shi,et al. The Promise of Edge Computing , 2016, Computer.
[22] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[23] Victor Chang,et al. Enterprise security and privacy: Why adding IoT and big data makes it so much more difficult , 2017, 2017 International Conference on Engineering and Technology (ICET).
[24] Jian Shen,et al. An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.
[25] Jian Shen,et al. A secure identity-based dynamic group data sharing scheme for cloud computing , 2017 .
[26] Huaqun Wang,et al. Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems , 2017, IEEE Access.
[27] Cong Wang,et al. Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[28] K. B. Letaief,et al. A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.
[29] Zdenek Becvar,et al. Mobile Edge Computing: A Survey on Architecture and Computation Offloading , 2017, IEEE Communications Surveys & Tutorials.
[30] Mahadev Satyanarayanan,et al. The Emergence of Edge Computing , 2017, Computer.
[31] Victor I. Chang. Data analytics and visualization for inspecting cancers and genes , 2017, Multimedia Tools and Applications.
[32] Jian Shen,et al. Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks , 2018, Int. J. Sens. Networks.
[33] Chih-Hsien Hsia. Improved Finger-Vein Pattern Method Using Wavelet-based for Real-Time Personal Identification System , 2018 .
[34] Chih-Hsien Hsia,et al. New Verification Strategy for Finger-Vein Recognition System , 2018, IEEE Sensors Journal.
[35] Chen Wang,et al. Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks , 2018 .
[36] Mingwu Zhang,et al. Accountable mobile E-commerce scheme in intelligent cloud system transactions , 2018, J. Ambient Intell. Humaniz. Comput..
[37] Jian Shen,et al. Privacy-Preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing , 2018, Inscrypt.
[38] Chen Wang,et al. CATE: Cloud-Aided Trustworthiness Evaluation Scheme for Incompletely Predictable Vehicular Ad Hoc Networks , 2019, IEEE Transactions on Vehicular Technology.
[39] Chen Wang,et al. Neighborhood trustworthiness‐based vehicle‐to‐vehicle authentication scheme for vehicular ad hoc networks , 2019, Concurr. Comput. Pract. Exp..
[40] Jian Shen,et al. Secure real-time image protection scheme with near-duplicate detection in cloud computing , 2019, Journal of Real-Time Image Processing.
[41] Jian Shen,et al. Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing , 2020, IEEE Transactions on Emerging Topics in Computing.
[42] Chen Wang,et al. Logarithmic encryption scheme for cyber-physical systems employing Fibonacci Q-matrix , 2020, Future Gener. Comput. Syst..
[43] Dengzhi Liu,et al. Secure Real-Time Traffic Data Aggregation With Batch Verification for Vehicular Cloud in VANETs , 2020, IEEE Transactions on Vehicular Technology.