4.6 Article

Public audit for operation behavior logs with error locating in cloud storage

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing

Jian Shen et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Artificial Intelligence

A secure transaction of cloud data using conditional source trust attributes encryption mechanism

Thomas Brindha et al.

SOFT COMPUTING (2018)

Article Computer Science, Information Systems

Secure attribute-based data sharing for resource-limited users in cloud computing

Jin Li et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Information Systems

Privacy-preserving outsourced classification in cloud computing

Ping Li et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2018)

Article Computer Science, Information Systems

Secure proof of storage with deduplication for cloud storage systems

Youngjoo Shin et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2017)

Article Computer Science, Information Systems

Secure deduplication for multimedia data with user revocation in cloud storage

Hyunsoo Kwon et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2017)

Article Computer Science, Artificial Intelligence

A position-aware Merkle tree for dynamic cloud data integrity verification

Jian Mao et al.

SOFT COMPUTING (2017)

Article Computer Science, Artificial Intelligence

Enabling public auditability for operation behaviors in cloud storage

Hui Tian et al.

SOFT COMPUTING (2017)

Article Computer Science, Theory & Methods

Multi-key privacy-preserving deep learning in cloud computing

Ping Li et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Computer Science, Information Systems

Cloud Data Auditing Techniques with a Focus on Privacy and Security

Manjur Kolhar et al.

IEEE SECURITY & PRIVACY (2017)

Article Computer Science, Theory & Methods

Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data

Zhangjie Fu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data

Zhangjie Fu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

Insight of the protection for data security under selective opening attacks

Zhengan Huang et al.

INFORMATION SCIENCES (2017)

Article Computer Science, Artificial Intelligence

DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data

Lanxiang Chen et al.

SOFT COMPUTING (2017)

Article Computer Science, Information Systems

Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage

Hui Tian et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)

Article Computer Science, Information Systems

A secure cloud-assisted urban data sharing framework for ubiquitous-cities

Jian Shen et al.

PERVASIVE AND MOBILE COMPUTING (2017)

Article Computer Science, Information Systems

Privacy-preserving public auditing for educational multimedia data in cloud computing

Daeyeong Kim et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2016)

Article Computer Science, Artificial Intelligence

A secure cloud storage system supporting privacy-preserving fuzzy deduplication

Xuan Li et al.

SOFT COMPUTING (2016)

Article Computer Science, Theory & Methods

A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing

Zhihua Xia et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Theory & Methods

Remote Data Auditing in Cloud Computing Environments: A Survey, Taxonomy, and Open Issues

Mehdi Sookhak et al.

ACM COMPUTING SURVEYS (2015)

Article Computer Science, Theory & Methods

Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage

Jian Liu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage

Lan Zhou et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Boyang Wang et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)

Article Computer Science, Information Systems

OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices

Jin Li et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2015)

Proceedings Paper Computer Science, Information Systems

Gradually Improving the Forensic Process

Sebastian Neuner et al.

PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015 (2015)

Proceedings Paper Computer Science, Information Systems

OCF: An Open Cloud Forensics Model for Reliable Digital Forensics

Shams Zawoad et al.

2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (2015)

Article Computer Science, Theory & Methods

Secure Deduplication with Efficient and Reliable Convergent Key Management

Jin Li et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Theory & Methods

Securely Outsourcing Attribute-Based Encryption with Checkability

Jin Li et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Review Computer Science, Hardware & Architecture

A review on remote data auditing in single cloud server: Taxonomy and open issues

Mehdi Sookhak et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)

Article Computer Science, Hardware & Architecture

Privacy-Preserving Public Auditing for Secure Cloud Storage

Cong Wang et al.

IEEE TRANSACTIONS ON COMPUTERS (2013)

Article Computer Science, Theory & Methods

DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems

Kan Yang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Computer Science, Theory & Methods

Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems

Ayad Barsoum et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Theory & Methods

An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing

Kan Yang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Information Systems

Dynamic Audit Services for Outsourced Storages in Clouds

Yan Zhu et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2013)

Article Computer Science, Information Systems

An integrated conceptual digital forensic framework for cloud computing

Ben Martini et al.

DIGITAL INVESTIGATION (2012)

Article Computer Science, Software Engineering

Security Challenges for the Public Cloud

Kui Ren et al.

IEEE INTERNET COMPUTING (2012)

Article Computer Science, Theory & Methods

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing

Qian Wang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2011)

Article Computer Science, Hardware & Architecture

Toward Publicly Auditable Secure Cloud Data Storage Services

Cong Wang et al.

IEEE NETWORK (2010)

Article Computer Science, Hardware & Architecture

A new approach to secure logging

Di Ma et al.

ACM Transactions on Storage (2009)

Proceedings Paper Computer Science, Information Systems

Safekeeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges

Rafael Accorsi

IMF 2009: 5TH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT AND IT FORENSIC (2009)

Article Computer Science, Software Engineering

Network forensics analysis

V Corey et al.

IEEE INTERNET COMPUTING (2002)