4.5 Article

A threshold hybrid encryption method for integrity audit without trusted center

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

A Lightweight Auditing Service for Shared Data with Secure User Revocation in Cloud Storage

Reyhaneh Rabaninejad et al.

Summary: In this paper, a public shared data auditing mechanism is proposed, which provides identity privacy and collusion resistant user revocation simultaneously by employing a new proxy re-signature scheme. The proposed protocol requires only lightweight computations at the user side for signing data blocks in real-time online phase.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Information Systems

Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage

Jiguo Li et al.

Summary: Cloud storage service offers an efficient way for data sharing within a group, but ensuring data integrity requires RDPC protocols. Traditional PKI-based RDPC protocols have security flaws and certificate management burden, leading to the adoption of IBC for its basis, despite the key escrow issue. To address these challenges, a new RDPC protocol is proposed using certificateless signature technique to eliminate the need for certificates and key escrow problems.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)

Article Automation & Control Systems

Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System

Arun Kumar Sangaiah et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Theory & Methods

Improved publicly verifiable group sum evaluation over outsourced data streams in IoT setting

Xu An Wang et al.

COMPUTING (2019)

Article Computer Science, Theory & Methods

Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage

Wenting Shen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Artificial Intelligence

Improved secure fuzzy auditing protocol for cloud data storage

Jindan Zhang et al.

SOFT COMPUTING (2019)

Article Automation & Control Systems

Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics

Arun Kumar Sangaiah et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Computer Science, Information Systems

Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification

Xu An Wang et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Theory & Methods

Privacy-Preserving Deep Learning via Weight Transmission

Le Trieu Phong et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Information Systems

Energy Consumption in Point-Coverage Wireless Sensor Networks via Bat Algorithm

Arun Kumar Sangaiah et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Dynamic Trust Relationships Aware Data Privacy Protection in Mobile Crowd-Sensing

Dapeng Wu et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Theory & Methods

Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage

Cheng Guo et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Privacy-Preserving Deep Learning via Additively Homomorphic Encryption

Le Trieu Phong et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Editorial Material Computer Science, Information Systems

Guest Editorial Special Issue on Integrated Computing: Computational Intelligence Paradigms and Internet of Things for Industrial Applications

Joel J. P. C. Rodrigues et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

Audit-Free Cloud Storage via Deniable Attribute-Based Encryption

Po-Wen Chi et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2018)

Article Computer Science, Theory & Methods

An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data

Jian Shen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

Strong Key-Exposure Resilient Auditing for Secure Cloud Storage

Jia Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

Socially Aware Energy-Efficient Mobile Edge Collaboration for Video Distribution

Dapeng Wu et al.

IEEE TRANSACTIONS ON MULTIMEDIA (2017)

Article Computer Science, Information Systems

Social Attribute Aware Incentive Mechanism for Device-to-Device Video Distribution

Dapeng Wu et al.

IEEE TRANSACTIONS ON MULTIMEDIA (2017)

Article Computer Science, Hardware & Architecture

Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium

Wenting Shen et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Information Systems

Privacy-preserving public auditing for educational multimedia data in cloud computing

Daeyeong Kim et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2016)

Article Computer Science, Hardware & Architecture

Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation

Tao Jiang et al.

IEEE TRANSACTIONS ON COMPUTERS (2016)

Article Computer Science, Theory & Methods

Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification

Jiawei Yuan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Boyang Wang et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)

Article Computer Science, Information Systems

Identity-Based Distributed Provable Data Possession in Multicloud Storage

Huaqun Wang

IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)

Proceedings Paper Automation & Control Systems

Enhancing Distributed Data Storage Security for Cloud Computing Using TPA and AES algorithm

Nivedita Shimbre et al.

1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015 (2015)

Article Computer Science, Information Systems

Security issues in cloud environments: a survey

Diogo A. B. Fernandes et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2014)

Article Computer Science, Information Systems

Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

Boyang Wang et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2014)

Editorial Material Computer Science, Information Systems

The Threat in the Cloud

Matthew Green

IEEE SECURITY & PRIVACY (2013)

Review Information Science & Library Science

A Review of Cloud Computing

E. B. Dudin et al.

SCIENTIFIC AND TECHNICAL INFORMATION PROCESSING (2011)