메뉴 건너뛰기




Volumn 78, Issue , 2018, Pages 712-719

Anonymous and secure aggregation scheme in fog-based public cloud computing

Author keywords

Anonymity; Cloud computing; Fog computing; Homomorphic encryption; Terminal device

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; FOG;

EID: 85014042880     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2017.02.032     Document Type: Article
Times cited : (144)

References (36)
  • 1
    • 84986631527 scopus 로고    scopus 로고
    • A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
    • Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K., A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11:11 (2016), 2594–2608.
    • (2016) IEEE Trans. Inf. Forensics Secur. , vol.11 , Issue.11 , pp. 2594-2608
    • Xia, Z.1    Wang, X.2    Zhang, L.3    Qin, Z.4    Sun, X.5    Ren, K.6
  • 2
    • 84982135416 scopus 로고    scopus 로고
    • Enabling personalized search over encrypted outsourced data with efficiency improvement
    • Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F., Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27:9 (2016), 2546–2559.
    • (2016) IEEE Trans. Parallel Distrib. Syst. , vol.27 , Issue.9 , pp. 2546-2559
    • Fu, Z.1    Ren, K.2    Shu, J.3    Sun, X.4    Huang, F.5
  • 3
    • 84962448916 scopus 로고    scopus 로고
    • A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
    • Xia, Z., Wang, X., Sun, X., Wang, Q., A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27:2 (2015), 340–352.
    • (2015) IEEE Trans. Parallel Distrib. Syst. , vol.27 , Issue.2 , pp. 340-352
    • Xia, Z.1    Wang, X.2    Sun, X.3    Wang, Q.4
  • 9
    • 84928596525 scopus 로고    scopus 로고
    • An overview of fog computing and its security issues
    • Stojmenovic, I., Wen, S., Huang, X., Luan, H., An overview of fog computing and its security issues. Concurr. Comput.: Pract. Exper. 28:10 (2016), 2991–3005, 10.1002/cpe.3485.
    • (2016) Concurr. Comput.: Pract. Exper. , vol.28 , Issue.10 , pp. 2991-3005
    • Stojmenovic, I.1    Wen, S.2    Huang, X.3    Luan, H.4
  • 10
    • 0030577321 scopus 로고    scopus 로고
    • A new privacy homomorphism and applications
    • Domingo-Ferrer, J., A new privacy homomorphism and applications. Inform. Process. Lett. 60:5 (1996), 277–282.
    • (1996) Inform. Process. Lett. , vol.60 , Issue.5 , pp. 277-282
    • Domingo-Ferrer, J.1
  • 13
    • 0035751083 scopus 로고    scopus 로고
    • Paillier's cryptosystem revisited, in: Proceedings of CCS’01, Swissôtel Chicago, Chicago, USA, Oct. 17–21, 2011, pp. 206–214.
    • D. Catalano, R. Gennaro, N. Howgrave-Graham, P.Q. Nguyen, Paillier's cryptosystem revisited, in: Proceedings of CCS’01, Swissôtel Chicago, Chicago, USA, Oct. 17–21, 2011, pp. 206–214.
    • Catalano, D.1    Gennaro, R.2    Howgrave-Graham, N.3    Nguyen, P.Q.4
  • 16
    • 33947653261 scopus 로고    scopus 로고
    • An efficient probabilistic public-key cryptosystem over quadratic fields quotients
    • Castagnos, G., An efficient probabilistic public-key cryptosystem over quadratic fields quotients. Finite Fields Appl. 13:3 (2007), 563–576.
    • (2007) Finite Fields Appl. , vol.13 , Issue.3 , pp. 563-576
    • Castagnos, G.1
  • 17
    • 84864583229 scopus 로고    scopus 로고
    • Eppa: an efficient and privacy-preserving aggregation scheme for secure smart grid communications
    • Lu, R., Liang, X., Li, X., Lin, X., Shen, X., Eppa: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23:9 (2012), 1621–1631.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.9 , pp. 1621-1631
    • Lu, R.1    Liang, X.2    Li, X.3    Lin, X.4    Shen, X.5
  • 18
    • 84861586183 scopus 로고    scopus 로고
    • Asymmetric homomorphisms for secure aggregation in heterogeneous scenarios
    • Viejo, A., Wu, Q., Domingo-Ferrer, J., Asymmetric homomorphisms for secure aggregation in heterogeneous scenarios. Inf. Fusion 13:4 (2012), 285–295.
    • (2012) Inf. Fusion , vol.13 , Issue.4 , pp. 285-295
    • Viejo, A.1    Wu, Q.2    Domingo-Ferrer, J.3
  • 20
    • 0345058960 scopus 로고    scopus 로고
    • A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications
    • Springer Heidelberg
    • Bresson, E., Catalano, D., Pointcheval, D., A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. ASIACRYPT 2003 LNCS, vol. 2894, 2003, Springer, Heidelberg, 37–54.
    • (2003) ASIACRYPT 2003, LNCS , vol.2894 , pp. 37-54
    • Bresson, E.1    Catalano, D.2    Pointcheval, D.3
  • 22
    • 85006994029 scopus 로고    scopus 로고
    • Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps
    • Orazio, C., Choo, K., Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps. Future Gener. Comput. Syst., 2016, 10.1016/j.future.2016.11.010.
    • (2016) Future Gener. Comput. Syst.
    • Orazio, C.1    Choo, K.2
  • 23
    • 84994744881 scopus 로고    scopus 로고
    • A technique to circumvent SSL/TLS validations on iOS devices
    • Orazio, C., Choo, K., A technique to circumvent SSL/TLS validations on iOS devices. Future Gener. Comput. Syst., 2016, 10.1016/j.future.2016.08.019.
    • (2016) Future Gener. Comput. Syst.
    • Orazio, C.1    Choo, K.2
  • 24
    • 85018406878 scopus 로고    scopus 로고
    • Data exfiltration from Internet of Things devices: iOS devices as case studies
    • Orazio, C., Choo, K., Yang, L., Data exfiltration from Internet of Things devices: iOS devices as case studies. IEEE Internet Things J., 2016, 10.1109/JIOT.2016.2569094.
    • (2016) IEEE Internet Things J.
    • Orazio, C.1    Choo, K.2    Yang, L.3
  • 25
    • 85007162548 scopus 로고    scopus 로고
    • The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication apps
    • Cahyani, N., Ab Rahman, N., Glisson, W., Choo, K., The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication apps. Mob. Netw. Appl., 2016, 10.1007/s11036-016-0791-8.
    • (2016) Mob. Netw. Appl.
    • Cahyani, N.1    Ab Rahman, N.2    Glisson, W.3    Choo, K.4
  • 26
    • 84922280033 scopus 로고    scopus 로고
    • Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing
    • Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J., Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98-B:1 (2015), 190–200.
    • (2015) IEICE Trans. Commun. , vol.E98-B , Issue.1 , pp. 190-200
    • Fu, Z.1    Sun, X.2    Liu, Q.3    Zhou, L.4    Shu, J.5
  • 27
    • 84926455204 scopus 로고    scopus 로고
    • Social network and tag sources based augmenting collaborative recommender system
    • Ma, T., Zhou, J., Tang, M., Tian, Y., Al-Dhelaan, A., Al-Rodhaan, M., Lee, S., Social network and tag sources based augmenting collaborative recommender system. IEICE Trans. Inf. Syst. E98-D:4 (2015), 902–910.
    • (2015) IEICE Trans. Inf. Syst. , vol.E98-D , Issue.4 , pp. 902-910
    • Ma, T.1    Zhou, J.2    Tang, M.3    Tian, Y.4    Al-Dhelaan, A.5    Al-Rodhaan, M.6    Lee, S.7
  • 28
    • 84981328411 scopus 로고    scopus 로고
    • A speculative approach to spatialtemporal efficiency with multiobjective optimization in a heterogeneous cloud environment
    • Liu, Q., Cai, W., Shen, J., Fu, Z., Liu, X., Linge, N., A speculative approach to spatialtemporal efficiency with multiobjective optimization in a heterogeneous cloud environment. Secur. Commun. Netw. 9:17 (2016), 4002–4012.
    • (2016) Secur. Commun. Netw. , vol.9 , Issue.17 , pp. 4002-4012
    • Liu, Q.1    Cai, W.2    Shen, J.3    Fu, Z.4    Liu, X.5    Linge, N.6
  • 29
    • 84995871772 scopus 로고    scopus 로고
    • A belief propagation-based method for task allocation in open and dynamic cloud environments
    • Kong, Y., Zhang, M., Ye, D., A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl.-Based Syst. 115 (2016), 123–132.
    • (2016) Knowl.-Based Syst. , vol.115 , pp. 123-132
    • Kong, Y.1    Zhang, M.2    Ye, D.3
  • 30
    • 84856182115 scopus 로고    scopus 로고
    • Pseudonym changing at social spots: an effective strategy for location privacy in VANETs
    • Lu, R., Li, X., Luan, T.H., Liang, X., Shen, X., Pseudonym changing at social spots: an effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 61:1 (2012), 86–96.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.1 , pp. 86-96
    • Lu, R.1    Li, X.2    Luan, T.H.3    Liang, X.4    Shen, X.5
  • 31
    • 84883345595 scopus 로고    scopus 로고
    • Fully anonymous profile matching in mobile social networks
    • Liang, X., Li, X., Zhang, K., Lu, R., Lin, X., Shen, X., Fully anonymous profile matching in mobile social networks. IEEE J. Sel. Areas Commun. 31:9 (2013), 641–655.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 641-655
    • Liang, X.1    Li, X.2    Zhang, K.3    Lu, R.4    Lin, X.5    Shen, X.6
  • 32
    • 84937877553 scopus 로고    scopus 로고
    • A practical privacy-preserving targeted advertising scheme for IPTV users
    • Khayati, L.J., Orencik, C., Savas, E., Ustaoglu, B., A practical privacy-preserving targeted advertising scheme for IPTV users. Int. J. Inf. Secur., 2015, 10.1007/s10207-015-0296-7.
    • (2015) Int. J. Inf. Secur.
    • Khayati, L.J.1    Orencik, C.2    Savas, E.3    Ustaoglu, B.4
  • 35
    • 0035336179 scopus 로고    scopus 로고
    • New explicit conditions of elliptic curve traces for FR-reduction
    • Miyaji, A., Nakabayashi, M., Takano, S., New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. Fundam. 5 (2001), 1234–1243.
    • (2001) IEICE Trans. Fundam. , vol.5 , pp. 1234-1243
    • Miyaji, A.1    Nakabayashi, M.2    Takano, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.