Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system
暂无分享,去创建一个
Anmin Fu | Huaqun Wang | Shui Yu | Yi Mu | Yinxia Sun | Lei Zhou | Y. Mu | Anmin Fu | Shui Yu | Huaqun Wang | Yinxia Sun | Lei Zhou
[1] Cong Wang,et al. Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates , 2016, IEEE Transactions on Information Forensics and Security.
[2] Rajkumar Buyya,et al. Dynamic remote data auditing for securing big data storage in cloud computing , 2017, Inf. Sci..
[3] Kim-Kwang Raymond Choo,et al. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems , 2019, IEEE Transactions on Dependable and Secure Computing.
[4] Yong Yu,et al. Privacy preserving cloud data auditing with efficient key update , 2018, Future Gener. Comput. Syst..
[5] Josep Domingo-Ferrer,et al. FRR: Fair remote retrieval of outsourced private medical records in electronic health networks , 2014, J. Biomed. Informatics.
[6] Ming Li,et al. Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings , 2010, SecureComm.
[7] Huaqun Wang,et al. Proxy Provable Data Possession in Public Clouds , 2013, IEEE Transactions on Services Computing.
[8] Tao Zhang,et al. Semi-supervised learning quantization algorithm with deep features for motor imagery EEG Recognition in smart healthcare application , 2020, Appl. Soft Comput..
[9] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[10] Roberto Tamassia,et al. Dynamic provable data possession , 2009, IACR Cryptol. ePrint Arch..
[11] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[12] Naixue Xiong,et al. EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing , 2017, Inf. Sci..
[13] Huaqun Wang,et al. Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession , 2019, IEEE Transactions on Services Computing.
[14] Naixue Xiong,et al. Blocked linear secret sharing scheme for scalable attribute based encryption in manageable cloud storage system , 2018, Inf. Sci..
[15] Xiaojiang Du,et al. IntegrityChain: Provable Data Possession for Decentralized Storage , 2020, IEEE Journal on Selected Areas in Communications.
[16] Cong Wang,et al. Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[17] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[18] Jinjun Chen,et al. MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud , 2015, IEEE Transactions on Computers.
[19] Hao Yan,et al. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.
[20] Stephen S. Yau,et al. Dynamic audit services for integrity verification of outsourced storages in clouds , 2011, SAC.
[21] Anmin Fu,et al. DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems , 2018, J. Netw. Comput. Appl..
[22] M. Anwar Hasan,et al. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems , 2015, IEEE Transactions on Information Forensics and Security.
[23] Xinpeng Zhang,et al. Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy , 2016, ACISP.
[24] Han Zhou,et al. AKSER: Attribute-based keyword search with efficient revocation in cloud computing , 2018, Inf. Sci..
[25] Jing Wang,et al. A Compact Ciphertext-Policy Attribute-Based Encryption Scheme for the Information-Centric Internet of Things , 2018, IEEE Access.
[26] Naixue Xiong,et al. An effective information detection method for social big data , 2018, Multimedia Tools and Applications.
[27] Eric Horvitz,et al. Patient controlled encryption: ensuring privacy of electronic medical records , 2009, CCSW '09.
[28] Shuai Li,et al. Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server , 2018, J. Netw. Comput. Appl..
[29] J. Jasper,et al. Cloud based security on outsourcing using blockchain in E-health systems , 2020, Comput. Networks.
[30] Jinjun Chen,et al. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates , 2014, IEEE Transactions on Parallel and Distributed Systems.
[31] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[32] Benjamin Fabian,et al. Collaborative and secure sharing of healthcare data in multi-clouds , 2015, Inf. Syst..
[33] Lei Zhou,et al. Data integrity verification of the outsourced big data in the cloud environment: A survey , 2018, J. Netw. Comput. Appl..
[34] Fatos Xhafa,et al. Designing cloud-based electronic health record system with attribute-based encryption , 2014, Multimedia Tools and Applications.
[35] Xuejiao Liu,et al. Secure and efficient querying over personal health records in cloud computing , 2018, Neurocomputing.