메뉴 건너뛰기




Volumn 70, Issue 2, 2014, Pages 946-976

BSS: block-based sharing scheme for secure data storage services in mobile cloud environment

Author keywords

Cloud computing; Mobile cloud computing; Privacy; Security

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; DATA PRIVACY; DIGITAL STORAGE; ENERGY EFFICIENCY; ENERGY UTILIZATION; MOBILE SECURITY; MOBILE TELECOMMUNICATION SYSTEMS; STORAGE AS A SERVICE (STAAS);

EID: 84919877569     PISSN: 09208542     EISSN: 15730484     Source Type: Journal    
DOI: 10.1007/s11227-014-1269-8     Document Type: Article
Times cited : (62)

References (36)
  • 1
    • 84866668858 scopus 로고    scopus 로고
    • Towards secure mobile cloud computing: a survey
    • Khan AN et al (2013) Towards secure mobile cloud computing: a survey. Future Gener Comput Syst 29(5):1278–1299
    • (2013) Future Gener Comput Syst , vol.29 , Issue.5 , pp. 1278-1299
    • Khan, A.N.1
  • 2
    • 84894666247 scopus 로고    scopus 로고
    • A survey of mobile cloud computing application models
    • Khan A et al (2013) A survey of mobile cloud computing application models. IEEE Commun Surv Tutor 16(1):393–413
    • (2013) IEEE Commun Surv Tutor , vol.16 , Issue.1 , pp. 393-413
    • Khan, A.1
  • 3
    • 77951039985 scopus 로고    scopus 로고
    • Cloud computing for mobile users: can offloading computation save energy?
    • Kumar K, Lu YH (2010) Cloud computing for mobile users: can offloading computation save energy? Computer 43(4):51–56
    • (2010) Computer , vol.43 , Issue.4 , pp. 51-56
    • Kumar, K.1    Lu, Y.H.2
  • 5
    • 84901983571 scopus 로고    scopus 로고
    • Taxonomy of the security aspects of cloud computing systems—a survey
    • Hashemi SM, Ardakani MRM (2012) Taxonomy of the security aspects of cloud computing systems—a survey. Int J Appl Inf Syst 4(1):21–28
    • (2012) Int J Appl Inf Syst , vol.4 , Issue.1 , pp. 21-28
    • Hashemi, S.M.1    Ardakani, M.R.M.2
  • 6
    • 84919878265 scopus 로고    scopus 로고
    • Juniper (2010) Technical report: Mobile cloud computing: 9.5 billion by 2014. Accessed 24 April 2013
    • Juniper (2010) Technical report: Mobile cloud computing: 9.5 billion by 2014. http://www.juniperresearch.com/reports/mobile_cloud_applications_and_services. Accessed 24 April 2013
  • 7
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11
    • (2011) J Netw Comput Appl , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 8
    • 84929445167 scopus 로고    scopus 로고
    • Towards trusted cloud computing. In: Proceedings of the 2009 conference on Hot topics in cloud computing
    • Santos N, Gummadi KP, Rodrigues R (2009) Towards trusted cloud computing. In: Proceedings of the 2009 conference on Hot topics in cloud computing. USENIX Association
    • (2009) USENIX Association
    • Santos, N.1    Gummadi, K.P.2    Rodrigues, R.3
  • 9
    • 84888011760 scopus 로고    scopus 로고
    • Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
    • Khan AN et al (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Supercomput 66(3):1687–1706
    • (2013) J Supercomput , vol.66 , Issue.3 , pp. 1687-1706
    • Khan, A.N.1
  • 11
    • 84901987724 scopus 로고    scopus 로고
    • Incremental proxy re-encryption scheme for mobile cloud computing environment
    • Khan AN et al (2014) Incremental proxy re-encryption scheme for mobile cloud computing environment. J Supercomput 68(2):624–651
    • (2014) J Supercomput , vol.68 , Issue.2 , pp. 624-651
    • Khan, A.N.1
  • 12
    • 80053551895 scopus 로고    scopus 로고
    • Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing
    • Ren W et al (2011) Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing. Tsinghua Sci Technol 16(5):520–528
    • (2011) Tsinghua Sci Technol , vol.16 , Issue.5 , pp. 520-528
    • Ren, W.1
  • 16
    • 78449236807 scopus 로고    scopus 로고
    • MobiCloud: building secure cloud framework for mobile computing and communication. In: 5th IEEE international symposium on service oriented system engineering (SOSE ’10)
    • Huang D et al (2010) MobiCloud: building secure cloud framework for mobile computing and communication. In: 5th IEEE international symposium on service oriented system engineering (SOSE ’10), pp 27–34
    • (2010) pp 27–34
    • Huang, D.1
  • 17
    • 79960590319 scopus 로고    scopus 로고
    • Secure data processing framework for mobile cloud computing. In: IEEE conference on computer communications workshops (INFOCOM WKSHPS ‘11)
    • Huang D et al (2011) Secure data processing framework for mobile cloud computing. In: IEEE conference on computer communications workshops (INFOCOM WKSHPS ‘11), pp 614–618
    • (2011) pp 614–618
    • Huang, D.1
  • 19
    • 80052758369 scopus 로고    scopus 로고
    • Meetings through the cloud: privacy-preserving scheduling on mobile devices
    • Bilogrevic I et al (2011) Meetings through the cloud: privacy-preserving scheduling on mobile devices. J Syst Softw 84(11):1910–1927
    • (2011) J Syst Softw , vol.84 , Issue.11 , pp. 1910-1927
    • Bilogrevic, I.1
  • 20
    • 79952030338 scopus 로고    scopus 로고
    • Chehab A (2010) Energy-efficient incremental integrity for securing storage in mobile cloud computing
    • IEEE, Cairo:
    • Itani W, Kayssi A, Chehab A (2010) Energy-efficient incremental integrity for securing storage in mobile cloud computing. In: International conference on energy aware computing (ICEAC ’10), IEEE, Cairo, pp 1–2
    • International conference on energy aware computing (ICEAC ’10) , pp. 1-2
    • Itani, W.1    Kayssi, A.2
  • 21
    • 80052421238 scopus 로고    scopus 로고
    • Secure cloud storage for convenient data archive of smart phones. In: IEEE 15th international symposium on consumer electronics (ISCE ’11)
    • Hsueh SC, Lin JY, Lin MY (2011) Secure cloud storage for convenient data archive of smart phones. In: IEEE 15th international symposium on consumer electronics (ISCE ’11), pp 156–161
    • (2011) pp 156–161
    • Hsueh, S.C.1    Lin, J.Y.2    Lin, M.Y.3
  • 22
    • 79961227180 scopus 로고    scopus 로고
    • Provable data possession of resource-constrained mobile devices in cloud computing
    • Yang J et al (2011) Provable data possession of resource-constrained mobile devices in cloud computing. J Netw 6(7):1033–1040
    • (2011) J Netw , vol.6 , Issue.7 , pp. 1033-1040
    • Yang, J.1
  • 24
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • IEEE, NJ:
    • Yu S et al (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings IEEE (INFOCOM ’10) 2010. IEEE, NJ, pp 1–9
    • (2010) Proceedings IEEE (INFOCOM ’10) , vol.2010 , pp. 1-9
    • Yu, S.1
  • 25
    • 77952322035 scopus 로고    scopus 로고
    • CCA-secure proxy re-encryption without pairings
    • Shao J, Cao Z (2009) CCA-secure proxy re-encryption without pairings. Public Key Cryptogr PKC 2009:357–376
    • (2009) Public Key Cryptogr PKC , vol.2009 , pp. 357-376
    • Shao, J.1    Cao, Z.2
  • 26
    • 84919877635 scopus 로고    scopus 로고
    • Re-encryption-based key management towards secure and scalable mobile applications in clouds. In: IACR cryptology eprint archive
    • Tysowski PK, Hasan MA (2011) Re-encryption-based key management towards secure and scalable mobile applications in clouds. In: IACR cryptology eprint archive, vol 668
    • (2011) vol 668
    • Tysowski, P.K.1    Hasan, M.A.2
  • 27
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Ateniese G et al (2006) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur (TISSEC) 9(1):1–30
    • (2006) ACM Trans Inf Syst Secur (TISSEC) , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1
  • 29
    • 38049019206 scopus 로고    scopus 로고
    • Key establishment scheme for sensor networks with low communication cost
    • Kim Y et al (2007) Key establishment scheme for sensor networks with low communication cost. Auton Trust Comput 441–448
    • (2007) Auton Trust Comput , pp. 441-448
    • Kim, Y.1
  • 30
    • 83255164893 scopus 로고    scopus 로고
    • An intelligent approach of sniffer detection
    • Khan AN, Qureshi K, Khan S (2012) An intelligent approach of sniffer detection. Int Arab J Inf Technol 9(1):9–15
    • (2012) Int Arab J Inf Technol , vol.9 , Issue.1 , pp. 9-15
    • Khan, A.N.1    Qureshi, K.2    Khan, S.3
  • 31
    • 83255188622 scopus 로고    scopus 로고
    • Enhanced switched network sniffer detection technique based on IP packet routing
    • Khan AN, Qureshi K, Khan S (2009) Enhanced switched network sniffer detection technique based on IP packet routing. Inf Secur J Glob Perspect 18(4):153–162
    • (2009) Inf Secur J Glob Perspect , vol.18 , Issue.4 , pp. 153-162
    • Khan, A.N.1    Qureshi, K.2    Khan, S.3
  • 32
    • 84919878256 scopus 로고    scopus 로고
    • Remote API for Java (2012). Accessed 12 August 2012
    • Remote API for Java (2012) https://developers.google.com/appengine/docs/java/tools/remoteapiConfiguring_Remote_API_on_an_App_Engine_Client. Accessed 12 August 2012
  • 33
    • 84919878255 scopus 로고    scopus 로고
    • Google Cloud Storage Java API Overview (2012). Accessed 15 August 2012
    • Google Cloud Storage Java API Overview (2012) https://developers.google.com/appengine/docs/java/googlestorage/overview. Accessed 15 August 2012
  • 34
    • 84919878254 scopus 로고    scopus 로고
    • DeviceInfo API (2012). Accessed 02 April 2012
    • DeviceInfo API (2012) http://www.blackberry.com/developers/docs/4.3.0api/net/rim/device/api/system/DeviceInfo.html. http://www.salesforce.com/us/developer/docs/apexcode/index.htm Accessed 02 April 2012
  • 35
    • 0024645936 scopus 로고
    • Petri nets: properties, analysis and applications
    • Murata T (1989) Petri nets: properties, analysis and applications. Proc IEEE 77(4):541–580
    • (1989) Proc IEEE , vol.77 , Issue.4 , pp. 541-580
    • Murata, T.1
  • 36
    • 70649083043 scopus 로고    scopus 로고
    • Bjørner N (2009) Satisfiability modulo theories: an appetizer
    • Springer, New York:
    • de Moura L, Bjørner N (2009) Satisfiability modulo theories: an appetizer. In: Formal methods: foundations and applications. Springer, New York, pp 23–36
    • Formal methods: foundations and applications , pp. 23-36
    • de Moura, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.