相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities
Lei Zhang et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)
Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage
Jiguo Li et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)
Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage
Jiguo Li et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)
Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks
Huaxin Li et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)
Full Verifiability for Outsourced Decryption in Attribute Based Encryption
Jiguo Li et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)
Privacy-Preserving and Pairing-Free Multirecipient Certificateless Encryption With Keyword Search for Cloud-Assisted IIoT
Lu Yang et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Remote Data Checking With a Designated Verifier in Cloud Storage
Hao Yan et al.
IEEE SYSTEMS JOURNAL (2020)
Hierarchical attribute based encryption with continuous leakage-resilience
Jiguo Li et al.
INFORMATION SCIENCES (2019)
DeepDirect: Learning Directions of Social Ties with Edge-Based Network Embedding
Chaokun Wang et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2019)
Key-policy attribute-based encryption against continual auxiliary input leakage
Jiguo Li et al.
INFORMATION SCIENCES (2019)
CCA-secure ABE with outsourced decryption for fog computing
Cong Zuo et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage
Jiguo Li et al.
IEEE SYSTEMS JOURNAL (2018)
Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense
Huaxin Li et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage
Cong Zuo et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
Yong Yu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation
Yuan Zhang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
Hao Yan et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage
Debiao He et al.
INFORMATION SCIENCES (2017)
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
Jiguo Li et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)
KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
Jiguo Li et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
Huaqun Wang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Efficient ID-based public auditing for the outsourced data in cloud storage
Jianhong Zhang et al.
INFORMATION SCIENCES (2016)
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes
Jianting Ning et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Enabling Cloud Storage Auditing With Key-Exposure Resistance
Jia Yu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Security in cloud computing: Opportunities and challenges
Mazhar Ali et al.
INFORMATION SCIENCES (2015)
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
Boyang Wang et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Huaqun Wang
IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)
Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation
Huiling Qian et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2015)
A New Public Remote Integrity Checking Scheme with User Privacy
Yiteng Feng et al.
INFORMATION SECURITY AND PRIVACY (ACISP 2015) (2015)
On the security of auditing mechanisms for secure cloud storage
Yong Yu et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2014)
Identity-based remote data possession checking in public clouds
Huaqun Wang et al.
IET INFORMATION SECURITY (2014)
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Boyang Wang et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2014)
Privacy-Preserving Public Auditing for Secure Cloud Storage
Cong Wang et al.
IEEE TRANSACTIONS ON COMPUTERS (2013)
An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
Kan Yang et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage
Yan Zhu et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)
A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
Zhuo Hao et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2011)
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
Qian Wang et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2011)
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
Rajkumar Buyya et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2009)
Efficient remote data possession checking in critical information infrastructures
Francesc Sebe et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2008)
Short signatures from the Weil pairing
D Boneh et al.
JOURNAL OF CRYPTOLOGY (2004)