相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article
Computer Science, Information Systems
Youliang Tian et al.
Summary: This paper presents a graph clustering privacy-preserving method based on structure entropy, which protects private information and ensures accurate mining results. Experimental evaluation shows that this method has higher efficiency and reliability.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Yanyan Ji et al.
Summary: Traditional remote data possession auditing mechanisms are divided into private auditing and public auditing. However, existing protocols cannot meet the requirement of data owners who want a specific verifier to audit their data. To overcome this limitation, researchers propose an identity-based auditing protocol that avoids the complexity of certificate management and enables specific verifiers to perform the audit.
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Yanyan Ji et al.
Summary: This paper discusses an improved approach to the provable data possession protocol, reducing communication overhead through flexible data splitting and tag aggregating techniques, and introducing identity-based signatures to make the protocol completely identity-based.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2022)
Article
Automation & Control Systems
Qi Li et al.
Summary: This article proposes an efficient, traceable, and revocable access control scheme named TRAC for mobile healthcare in 5G-enabled IIoT. It utilizes ciphertext-policy attribute-based encryption to protect the confidentiality of personal health records and can precisely track and revoke the privileges of malicious users.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Article
Computer Science, Information Systems
Yangfei Lin et al.
Summary: The applications of IoT have had a significant impact on various aspects of people's lives, creating a large volume of data. To ensure the integrity of cloud-stored data, a consortium blockchain-based public integrity verification system is proposed, in which the behaviors of third-party auditors are recorded on the blockchain for auditing purposes.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Song Li et al.
Summary: To ensure the integrity of data stored in a cloud server, data owners need to use public auditing techniques. However, if data is modified dynamically during the data anonymization process, the auditing result becomes invalid. Therefore, we propose a new scheme based on redactable signatures, which allows direct transformation of signatures when sharing sensitive data, without the need for additional data sanitizers.
IEEE SYSTEMS JOURNAL
(2022)
Article
Computer Science, Theory & Methods
Yang Yang et al.
Summary: Cloud storage is becoming increasingly prevalent and checking its integrity is vital. This paper proposes an ID-based PDP protocol with compressed cloud storage to improve performance and reduce storage and computation costs.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2022)
Article
Engineering, Electrical & Electronic
Fan Kefeng et al.
Summary: The paper introduces a blockchain-based cloud data auditing scheme, which improves the stability, security, and performance of the scheme through a decentralized auditing framework and eliminates the dependency on a third-party auditor.
CHINESE JOURNAL OF ELECTRONICS
(2021)
Article
Computer Science, Theory & Methods
Jaya Rao Gudeme et al.
Summary: This paper proposes a certificateless privacy preserving public auditing scheme for dynamic shared data with group user revocation in cloud storage (CLPPPA), which protects data privacy from the verifier using a random masking technique. The scheme also supports shared data dynamics and group user revocation, while ensuring security under computational Diffie-Hellman (CDH) and discrete logarithm (DL) assumptions. The performance evaluation shows that CLPPPA achieves desirable efficiency.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
(2021)
Article
Computer Science, Hardware & Architecture
Rahul Mishra et al.
Summary: Cloud computing is a service that hosts data online and charges on a pay-per-use model. While it brings many benefits, there is a lack of trust from users towards cloud service providers, leading to concerns about data privacy and integrity. Researchers have introduced a novel dynamic data structure and auditing protocol to address these issues, enabling users to easily track data changes and recover corrupted data blocks.
JOURNAL OF SUPERCOMPUTING
(2021)
Article
Computer Science, Information Systems
Reyhaneh Rabaninejad et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2020)
Article
Automation & Control Systems
Jinbo Xiong et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2020)
Article
Computer Science, Information Systems
Xiaojun Zhang et al.
Article
Computer Science, Theory & Methods
Wei Guo et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2019)
Article
Engineering, Electrical & Electronic
Di Wang et al.
ELECTRONICS LETTERS
(2018)
Article
Computer Science, Information Systems
Hui Tian et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2017)
Article
Multidisciplinary Sciences
Ang Yang et al.
SCIENTIFIC WORLD JOURNAL
(2014)