Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding
暂无分享,去创建一个
Fagen Li | Yongjian Liao | Yu Fan | Shijie Zhou | Ganglin Zhang | Shijie Zhou | Fagen Li | Yongjian Liao | Ganglin Zhang | Yu Fan
[1] Jiankun Hu,et al. Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage , 2019, IEEE Transactions on Information Forensics and Security.
[2] Shangping Wang,et al. Multi-Keyword Searchable and Data Verifiable Attribute-Based Encryption Scheme for Cloud Storage , 2019, IEEE Access.
[3] Cong Wang,et al. Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data , 2020, IEEE Transactions on Dependable and Secure Computing.
[4] Yuguang Fang,et al. Cross-Domain Data Sharing in Distributed Electronic Health Record Systems , 2010, IEEE Transactions on Parallel and Distributed Systems.
[5] Stephen S. Yau,et al. Dynamic Audit Services for Outsourced Storages in Clouds , 2013, IEEE Transactions on Services Computing.
[6] Kai Huang,et al. Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing , 2018, Comput. Secur..
[7] Jiankun Hu,et al. Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds , 2017, IEEE Transactions on Information Forensics and Security.
[8] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[9] Anmin Fu,et al. Certificateless public verification scheme with privacy-preserving and message recovery for dynamic group , 2017, ACSW.
[10] Huaqun Wang,et al. Proxy Provable Data Possession in Public Clouds , 2013, IEEE Transactions on Services Computing.
[11] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[12] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[13] Junfeng Tian,et al. A Lightweight Secure Auditing Scheme for Shared Data in Cloud Storage , 2019, IEEE Access.
[14] Wenjing Lou,et al. Tell me the truth: Practically public authentication for outsourced databases with multi-user modification , 2017, Inf. Sci..
[15] Yong Yu,et al. Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.
[16] Josep Domingo-Ferrer,et al. Identity-based remote data possession checking in public clouds , 2014, IET Inf. Secur..
[17] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[18] Yuguang Fang,et al. HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency Healthcare , 2011, 2011 31st International Conference on Distributed Computing Systems.
[19] Fenghua Li,et al. Certificateless public auditing for data integrity in the cloud , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[20] Elaine Shi,et al. Cloud Data Protection for the Masses , 2012, Computer.
[21] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[22] Albert Y. Zomaya,et al. Auditing Big Data Storage in Cloud Computing Using Divide and Conquer Tables , 2018, IEEE Transactions on Parallel and Distributed Systems.
[23] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[24] Hui Li,et al. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.
[25] Wenting Shen,et al. Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability , 2016, J. Syst. Softw..
[26] Huaqun Wang,et al. Identity-Based Distributed Provable Data Possession in Multicloud Storage , 2015, IEEE Transactions on Services Computing.
[27] Jianwei Liu,et al. A Remote Data Integrity Checking Scheme for Big Data Storage , 2017, 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC).
[28] Jing Han,et al. An Efficient Lucas Sequence-Based Batch Auditing Scheme for the Internet of Medical Things , 2019, IEEE Access.
[29] Hongjie Chen,et al. An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection , 2019, IEEE Access.
[30] Hui Li,et al. Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud , 2015, IEEE Transactions on Services Computing.
[31] Nigel P. Smart,et al. An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing , 2002, IACR Cryptol. ePrint Arch..
[32] Hongjie Chen,et al. Insecurity of an IBEET Scheme and an ABEET Scheme , 2019, IEEE Access.
[33] Yongjian Liao,et al. Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud , 2019, IEEE Access.
[34] José Luis Fernández Alemán,et al. Security and privacy in electronic health records: A systematic literature review , 2013, J. Biomed. Informatics.
[35] Fagen Li,et al. Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement , 2018, Comput. Stand. Interfaces.
[36] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[37] Sherali Zeadally,et al. Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks , 2018, IEEE Systems Journal.
[38] Yu Fan,et al. Cryptanalysis of an Identity-Based Encryption Scheme With Equality Test and Improvement , 2019, IEEE Access.
[39] Kim-Kwang Raymond Choo,et al. Privacy-preserving certificateless provable data possession scheme for big data storage on cloud , 2017, Appl. Math. Comput..
[40] Jia Yu,et al. Strong Key-Exposure Resilient Auditing for Secure Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.
[41] Fagen Li,et al. IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks , 2019, Mobile Networks and Applications.
[42] Hui Li,et al. Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud , 2012, ACNS.
[43] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..