相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing
Jian Shen et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)
A secure transaction of cloud data using conditional source trust attributes encryption mechanism
Thomas Brindha et al.
SOFT COMPUTING (2018)
Secure attribute-based data sharing for resource-limited users in cloud computing
Jin Li et al.
COMPUTERS & SECURITY (2018)
Privacy-preserving outsourced classification in cloud computing
Ping Li et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2018)
Secure proof of storage with deduplication for cloud storage systems
Youngjoo Shin et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2017)
Secure deduplication for multimedia data with user revocation in cloud storage
Hyunsoo Kwon et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2017)
A position-aware Merkle tree for dynamic cloud data integrity verification
Jian Mao et al.
SOFT COMPUTING (2017)
Enabling public auditability for operation behaviors in cloud storage
Hui Tian et al.
SOFT COMPUTING (2017)
Multi-key privacy-preserving deep learning in cloud computing
Ping Li et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)
Cloud Data Auditing Techniques with a Focus on Privacy and Security
Manjur Kolhar et al.
IEEE SECURITY & PRIVACY (2017)
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data
Zhangjie Fu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data
Zhangjie Fu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Insight of the protection for data security under selective opening attacks
Zhengan Huang et al.
INFORMATION SCIENCES (2017)
DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data
Lanxiang Chen et al.
SOFT COMPUTING (2017)
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
Hui Tian et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)
A secure cloud-assisted urban data sharing framework for ubiquitous-cities
Jian Shen et al.
PERVASIVE AND MOBILE COMPUTING (2017)
Privacy-preserving public auditing for educational multimedia data in cloud computing
Daeyeong Kim et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2016)
Realization of a data traceability and recovery service for a trusted authority service co-ordination within a Cloud environment
Nour Zawawi et al.
SOFT COMPUTING (2016)
A secure cloud storage system supporting privacy-preserving fuzzy deduplication
Xuan Li et al.
SOFT COMPUTING (2016)
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing
Zhihua Xia et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Remote Data Auditing in Cloud Computing Environments: A Survey, Taxonomy, and Open Issues
Mehdi Sookhak et al.
ACM COMPUTING SURVEYS (2015)
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Jian Liu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage
Lan Zhou et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
Boyang Wang et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)
OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
Jin Li et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2015)
Gradually Improving the Forensic Process
Sebastian Neuner et al.
PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015 (2015)
OCF: An Open Cloud Forensics Model for Reliable Digital Forensics
Shams Zawoad et al.
2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (2015)
Secure Deduplication with Efficient and Reliable Convergent Key Management
Jin Li et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
Securely Outsourcing Attribute-Based Encryption with Checkability
Jin Li et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
A review on remote data auditing in single cloud server: Taxonomy and open issues
Mehdi Sookhak et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)
Privacy-Preserving Public Auditing for Secure Cloud Storage
Cong Wang et al.
IEEE TRANSACTIONS ON COMPUTERS (2013)
DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems
Kan Yang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
Ayad Barsoum et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)
An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
Kan Yang et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)
Dynamic Audit Services for Outsourced Storages in Clouds
Yan Zhu et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2013)
An integrated conceptual digital forensic framework for cloud computing
Ben Martini et al.
DIGITAL INVESTIGATION (2012)
Security Challenges for the Public Cloud
Kui Ren et al.
IEEE INTERNET COMPUTING (2012)
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
Qian Wang et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2011)
Toward Publicly Auditable Secure Cloud Data Storage Services
Cong Wang et al.
IEEE NETWORK (2010)
A new approach to secure logging
Di Ma et al.
ACM Transactions on Storage (2009)
Safekeeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges
Rafael Accorsi
IMF 2009: 5TH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT AND IT FORENSIC (2009)
Network forensics analysis
V Corey et al.
IEEE INTERNET COMPUTING (2002)