Performance Evaluation of RSA-based Secure Cloud Storage Protocol using OpenStack
暂无分享,去创建一个
[1] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[2] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[3] Yang Lu,et al. Privacy preserving distributed optimization using homomorphic encryption , 2018, Autom..
[4] Xun Yi,et al. Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption , 2020, J. Parallel Distributed Comput..
[5] Hazrat Ali,et al. Distributed File Sharing and Retrieval Model for Cloud Virtual Environment , 2019 .
[6] Marjan Kuchaki Rafsanjani,et al. A survey on security challenges in cloud computing: issues, threats, and solutions , 2020, The Journal of Supercomputing.
[7] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[8] Hikmat Ullah Khan,et al. An Analysis of Issues for Adoption of Cloud Computing in Telecom Industries , 2018, Engineering, Technology & Applied Science Research.
[9] A. B. M. Shawkat Ali,et al. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..
[10] Naresh Vurukonda,et al. A Study on Data Storage Security Issues in Cloud Computing , 2016 .
[11] Abdelkarim Erradi,et al. Paillier's encryption: Implementation and cloud applications , 2015, 2015 International Conference on Applied Research in Computer Science and Engineering (ICAR).
[12] Noman Islam,et al. Towards Resilient Method: An exhaustive survey of fault tolerance methods in the cloud computing environment , 2021, Comput. Sci. Rev..
[13] Dehua Zhou,et al. Secure outsourced calculations with homomorphic encryption , 2018, Advanced Computing: An International Journal.
[14] Chengsheng Yuan,et al. An effective comparison protocol over encrypted data in cloud computing , 2019, J. Inf. Secur. Appl..
[15] Abed Ellatif Samhat,et al. Fully Enhanced Homomorphic Encryption algorithm of MORE approach for real world applications , 2017, J. Inf. Secur. Appl..
[16] Pan Jun Sun,et al. Security and privacy protection in cloud computing: Discussions and challenges , 2020, J. Netw. Comput. Appl..
[17] Mauro Conti,et al. A Survey on Homomorphic Encryption Schemes , 2017, ACM Comput. Surv..
[18] Pan Yang,et al. Data Security and Privacy Protection for Cloud Storage: A Survey , 2020, IEEE Access.
[19] Sadie Creese,et al. Insider Attacks in Cloud Computing , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[20] Yanjiao Chen,et al. A general framework to design secure cloud storage protocol using homomorphic encryption scheme , 2017, Comput. Networks.