Efficient and secure auditing scheme for privacy preserving data storage in cloud
暂无分享,去创建一个
[1] Mingxiao Ma,et al. Secure public-auditing cloud storage enabling data dynamics in the standard model , 2016, 2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC).
[2] D. Pratiba,et al. PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2013 .
[3] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[4] Cong Wang,et al. Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[5] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[6] S. Smys,et al. Performance analysis of virtual clusters in personal communication networks , 2012, Cluster Computing.
[7] P. Varalakshmi,et al. A Novel Secured Cryptographic Hash (NSCH) Algorithm , 2014 .
[8] Luis Miguel Vaquero Gonzalez,et al. Locking the sky: a survey on IaaS cloud security , 2010, Computing.
[9] Yucheng Zhang,et al. A novel cluster computing technique based on signal clustering and analytic hierarchy model using hadoop , 2017, Cluster Computing.
[10] Deepti P. Theng,et al. Analysing Security and Privacy Management for Cloud Computing Environment , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.
[11] Joonsang Baek,et al. A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid , 2015, IEEE Transactions on Cloud Computing.
[12] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[13] Richard J. Enbody,et al. Targeted Cyberattacks: A Superset of Advanced Persistent Threats , 2013, IEEE Security & Privacy.
[14] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.
[15] S. Smys,et al. Construction of virtual backbone to support mobility in MANET — A less overhead approach , 2009, 2009 International Conference on Application of Information and Communication Technologies.
[16] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.
[17] Muttukrishnan Rajarajan,et al. A survey on security issues and solutions at different layers of Cloud computing , 2012, The Journal of Supercomputing.
[18] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[19] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.