相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Blockchain-Based Private Provable Data Possession
Huaqun Wang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)
On the Blockchain-Based Decentralized Data Sharing for Event Based Encryption to Combat Adversarial Attacks
Ronald Doku et al.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2021)
Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree
Lu Rao et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)
New public auditing protocol based on homomorphic tags for secure cloud storage
Jindan Zhang et al.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2020)
A Public Auditing Protocol for Cloud Storage System With Intrusion-Resilience
Ran Ding et al.
IEEE SYSTEMS JOURNAL (2020)
Energy-Efficient and Trustworthy Data Collection Protocol Based on Mobile Fog Computing in Internet of Things
Tian Wang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System
Arun Kumar Sangaiah et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
Blockchain-based fair payment smart contract for public cloud storage auditing
Hao Wang et al.
INFORMATION SCIENCES (2020)
Blockchain-Based Dynamic Provable Data Possession for Smart Cities
Ruonan Chen et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Blockchain-Enabled Distributed Security Framework for Next-Generation IoT: An Edge Cloud and Software-Defined Network-Integrated Approach
Darshan Vishwasrao Medhane et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Proof of Storage-Time: Efficiently Checking Continuous Data Availability
Giuseppe Ateniese et al.
27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020) (2020)
Blockchain Empowered Arbitrable Data Auditing Scheme for Network Storage as a Service
Yang Xu et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)
Stochastic Blockchain for IoT Data Integrity
Yu-Jia Chen et al.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2020)
Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing
Jian Shen et al.
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2020)
Outsourced dynamic provable data possession with batch update for secure cloud storage
Wei Guo et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics
Arun Kumar Sangaiah et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)
ID-based dynamic replicated data auditing for the cloud
Haiyang Yu et al.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2019)
Poster: Proofs of Retrievability with Low Server Storage
Michael Hanling et al.
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)
Efficient Verifiable Delay Functions
Benjamin Wesolowski
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT III (2019)
Recent security challenges in cloud computing
Nalini Subramanian et al.
COMPUTERS & ELECTRICAL ENGINEERING (2018)
Privacy-Preserving Public Auditing for Non-manager Group Shared Data
Longxia Huang et al.
WIRELESS PERSONAL COMMUNICATIONS (2018)
PCCA: Position Confidentiality Conserving Algorithm for Content-Protection in e-Governance Services and Applications
Darshan Vishwasrao Medhane et al.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE (2018)
Public Auditing for Network Coding Based Secure Cloud Storage
Xiang Liu et al.
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) (2018)
Integrity as a service for replicated data on the cloud
Alshaimaa Abo-alian et al.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2017)
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data
Jian Shen et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Efficient integrity verification of replicated data in cloud computing system
Mingxu Yi et al.
COMPUTERS & SECURITY (2017)
A Novel approach to Secure Cloud Data Storage and Dynamic Data Auditing in a Cloud
K. Brindha et al.
PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017) (2017)
Provable multiple replication data possession with full dynamics for secure cloud storage
Yafang Zhang et al.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2016)
Dynamic Provable Data Possession
C. Chris Erway et al.
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2015)
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
Ayad F. Barsoum et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Proofs of Space
Stefan Dziembowski et al.
ADVANCES IN CRYPTOLOGY, PT II (2015)
Beyond the hype: Big data concepts, methods, and analytics
Amir Gandomi et al.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2015)
A Survey of Load Balancing in Cloud Computing: Challenges and Algorithms
Klaithem Al Nuaimi et al.
2012 IEEE SECOND SYMPOSIUM ON NETWORK CLOUD COMPUTING AND APPLICATIONS (NCCA 2012) (2012)