메뉴 건너뛰기




Volumn 2015-August, Issue , 2015, Pages 214-219

BDO-SD: An efficient scheme for big data outsourcing with secure deduplication

Author keywords

Big Data; Cloud Computing; Convergent Encryption; Data Deduplication; Keyword Search

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; DATA PRIVACY; OUTSOURCING; PUBLIC KEY CRYPTOGRAPHY; SEARCH ENGINES;

EID: 84943263073     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOMW.2015.7179387     Document Type: Conference Paper
Times cited : (14)

References (17)
  • 1
    • 80053502277 scopus 로고    scopus 로고
    • Cognitive radio based hierarchical communications infrastructure for smart grid
    • R. Yu, Y. Zhang, S. Gjessing, C. Yuen, S. Xie, and M. Guizani, "Cognitive radio based hierarchical communications infrastructure for smart grid", IEEE Network, vol. 25, no. 5, pp. 6-14, 2011.
    • (2011) IEEE Network , vol.25 , Issue.5 , pp. 6-14
    • Yu, R.1    Zhang, Y.2    Gjessing, S.3    Yuen, C.4    Xie, S.5    Guizani, M.6
  • 2
    • 84894047012 scopus 로고    scopus 로고
    • SESA: An Efficient Searchable Encryption Scheme for Auction in Emerging Smart Grid Marketing
    • M. Wen, R. Lu, J. Lei, H. Li, X. Liang, and X. Shen, "SESA: An Efficient Searchable Encryption Scheme for Auction in Emerging Smart Grid Marketing", Security and Communication Networks, vol. 7, no. 1, pp. 234-244, 2013.
    • (2013) Security and Communication Networks , vol.7 , Issue.1 , pp. 234-244
    • Wen, M.1    Lu, R.2    Lei, J.3    Li, H.4    Liang, X.5    Shen, X.6
  • 3
    • 84883788980 scopus 로고    scopus 로고
    • Big data, Hadoop and cloud computing in genomics
    • ODriscoll, Aisling and Daugelaite, Jurate and Sleator, Roy D,"Big data, Hadoop and cloud computing in genomics",Journal of biomedical informatics, vol. 46, no.5, pp.774-781, 2013.
    • (2013) Journal of Biomedical Informatics , vol.46 , Issue.5 , pp. 774-781
    • Aisling, O.1    Jurate, D.2    Sleator Roy, D.3
  • 4
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • Mar
    • C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing", in Proceeding of IEEE INFOCOM, Mar. 2010, pp. 1-9.
    • (2010) Proceeding of IEEE INFOCOM , pp. 1-9
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 5
    • 84897015477 scopus 로고    scopus 로고
    • Engineering a Distributed Infrastructure for Large-Scale Cost-Effective Content Dissemination over Urban Vehicular Networks
    • to appear
    • T. H. Luan, X. C. Lin, J. M. Chen, X. Shen, and F. Bai, "Engineering a Distributed Infrastructure for Large-Scale Cost-Effective Content Dissemination over Urban Vehicular Networks", IEEE Transaction on Vehicular Technology, to appear,2014.
    • (2014) IEEE Transaction on Vehicular Technology
    • Luan, T.H.1    Lin, X.C.2    Chen, J.M.3    Shen, X.4    Bai, F.5
  • 7
    • 0036373715 scopus 로고    scopus 로고
    • Reclaiming Space from Duplicate Files in a Serverless Distributed File System
    • J.R. Douceur, A. Adya, W.J. Bolosky, D. Simon, and M. Theimer, "Reclaiming Space from Duplicate Files in a Serverless Distributed File System", in Proceeding of ICDCS 2002, pp. 617-624.
    • (2002) Proceeding of ICDCS , pp. 617-624
    • Douceur, J.R.1    Adya, A.2    Bolosky, W.J.3    Simon, D.4    Theimer, M.5
  • 8
    • 84901032811 scopus 로고    scopus 로고
    • Secure Deduplication with Efficient and Reliable Convergent Key Management
    • J.Li and X.F.Chen, and F.Xhafa and L.Barolli, "Secure Deduplication with Efficient and Reliable Convergent Key Management", IEEE Trans. on Parallel and Distributed Systems, vol.25, no.6, pp.1615-1625, 2014.
    • (2014) IEEE Trans. on Parallel and Distributed Systems , vol.25 , Issue.6 , pp. 1615-1625
    • Li, J.1    Chen, X.F.2    Xhafa, F.3    Barolli, L.4
  • 11
    • 84874458079 scopus 로고    scopus 로고
    • Fast and Secure Laptop Backups with Encrypted De-Duplication
    • P.Anderson and L. Zhang, "Fast and Secure Laptop Backups with Encrypted De-Duplication", in Proceeding of USENIX LISA 2010, pp.1-8.
    • (2010) Proceeding of USENIX LISA , pp. 1-8
    • Anderson, P.1    Zhang, L.2
  • 12
    • 84961718586 scopus 로고    scopus 로고
    • PaRQ: A Privacy-preserving Range Query Scheme over Encrypted Metering Data for Smart Grid
    • M.Wen, and R. Lu, and K. Zhang, and J. Lei, and X. Liang, and X. Shen, "PaRQ: A Privacy-preserving Range Query Scheme over Encrypted Metering Data for Smart Grid", IEEE Transactions on Emerging Topics in Computing, Vol. 1, No. 1, pp. 178-191, 2013.
    • (2013) IEEE Transactions on Emerging Topics in Computing , vol.1 , Issue.1 , pp. 178-191
    • Wen, M.1    Lu, R.2    Zhang, K.3    Lei, J.4    Liang, X.5    Shen, X.6
  • 13
    • 84903828007 scopus 로고    scopus 로고
    • Secure Deduplication Storage Systems with Keyword Search
    • J. Li, X. F. Chen, F. Xhafa, L. Barolli, "Secure Deduplication Storage Systems with Keyword Search", in Proceeding of AINA 2014, pp. 971-977.
    • (2014) Proceeding of AINA , pp. 971-977
    • Li, J.1    Chen, X.F.2    Xhafa, F.3    Barolli, L.4
  • 16
    • 78649325305 scopus 로고    scopus 로고
    • An efficient public key encryption with conjunctive-subset keywords search
    • B. Zhang, F. Zhang, "An efficient public key encryption with conjunctive-subset keywords search", Journal of Network and Computer Applications, vol.34, no.1, pp.262-267, 2011.
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 262-267
    • Zhang, B.1    Zhang, F.2
  • 17
    • 23944473052 scopus 로고    scopus 로고
    • The exact security of an identity based signature and its applications
    • B. Libert and J.J. Quisquater, "The exact security of an identity based signature and its applications", Tech. Rep., eprint.iacr.org/2004/, 2004.
    • Tech. Rep., eprint.iacr.org/2004/ , vol.2004
    • Libert, B.1    Quisquater, J.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.