-
1
-
-
77950347409
-
A view of cloud computing
-
April
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica and M. Zaharia, A View of Cloud Computing, Communications of the ACM, Vol. 53, No. 4, pp. 50-58, April, 2010.
-
(2010)
Communications of the ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
77954879049
-
Cloud computing: A perspective study
-
April
-
L. Wang, G. Von Laszewski, A. Younge, X. He, M. Kunze, J. Tao and C. Fu, Cloud Computing: A Perspective Study, New Generation Computing, Vol. 28, No. 2, pp. 137-146, April, 2010.
-
(2010)
New Generation Computing
, vol.28
, Issue.2
, pp. 137-146
-
-
Wang, L.1
Von Laszewski, G.2
Younge, A.3
He, X.4
Kunze, M.5
Tao, J.6
Fu, C.7
-
3
-
-
85028458332
-
Survey on security issues in cloud computing
-
June
-
D. Sharma, P. Vaidya and O. Khan, Survey on Security Issues in Cloud Computing, International Journal of Innovative Technology and Exploring Engineering, Vol. 3, No. 1, June, 2013.
-
(2013)
International Journal of Innovative Technology and Exploring Engineering
, vol.3
, Issue.1
-
-
Sharma, D.1
Vaidya, P.2
Khan, O.3
-
4
-
-
85028454481
-
-
Storage Newsletter, Emerging 2012 Cloud Storage Trend by TwinStrata, http://www.storagenewsletter.com/rubriques/market-reportsresearch/emerging- 2012-cloud-storage-trend-twinstrata/.
-
Emerging 2012 Cloud Storage Trend by TwinStrata
-
-
-
6
-
-
84924368818
-
Security in cloud computing: Opportunities and challenges
-
June
-
M. Ali, S. U. Khan and A. V. Vasilakos, Security in Cloud Computing: Opportunities and Challenges, Information Sciences, Vol. 305, pp. 357-383, June, 2015.
-
(2015)
Information Sciences
, vol.305
, pp. 357-383
-
-
Ali, M.1
Khan, S.U.2
Vasilakos, A.V.3
-
7
-
-
84929085499
-
State-of-the-art survey on cloud computing security challenges, approaches and solutions
-
F. Shahzad, State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions, Procedia Computer Science, Vol. 37, pp. 357-362, 2014.
-
(2014)
Procedia Computer Science
, vol.37
, pp. 357-362
-
-
Shahzad, F.1
-
8
-
-
84973560504
-
An efficient RFID authentication protocol providing strong privacy and security
-
May
-
J. Shen, H. Tan, S. Moh, I. Chung and J. Wang, An Efficient RFID Authentication Protocol Providing Strong Privacy and Security, Journal of Internet Technology, Vol. 17, No. 3, pp. 443-455, May, 2016.
-
(2016)
Journal of Internet Technology
, vol.17
, Issue.3
, pp. 443-455
-
-
Shen, J.1
Tan, H.2
Moh, S.3
Chung, I.4
Wang, J.5
-
9
-
-
84890369044
-
An efficient verifiably encrypted signature from weil pairing
-
November
-
J. Shen, W. Zheng, J. Wang, Y. Zheng, X. Sun and S. Lee, An Efficient Verifiably Encrypted Signature from Weil Pairing, Journal of Internet Technology, Vol. 14, No. 6, pp. 947-952, November, 2013.
-
(2013)
Journal of Internet Technology
, vol.14
, Issue.6
, pp. 947-952
-
-
Shen, J.1
Zheng, W.2
Wang, J.3
Zheng, Y.4
Sun, X.5
Lee, S.6
-
10
-
-
84872875967
-
Identity-based key agreement protocol employing a symmetric balanced incomplete block design
-
December
-
J. Shen, S. Moh and I. Chung, Identity-based Key Agreement Protocol Employing a Symmetric Balanced Incomplete Block Design, Journal of Communications and Networks, Vol. 14, No. 6, pp. 682-691, December, 2012.
-
(2012)
Journal of Communications and Networks
, vol.14
, Issue.6
, pp. 682-691
-
-
Shen, J.1
Moh, S.2
Chung, I.3
-
11
-
-
84947804555
-
Enhanced secure sensor association and key management in wireless body area networks
-
October
-
J. Shen, H. Tan, S. Moh, I. Chung, Q. Liu and X. Sun, Enhanced Secure Sensor Association and Key Management in Wireless Body Area Networks, Journal of Communications and Networks, Vol. 17, No. 5, pp. 453-462, October, 2015.
-
(2015)
Journal of Communications and Networks
, vol.17
, Issue.5
, pp. 453-462
-
-
Shen, J.1
Tan, H.2
Moh, S.3
Chung, I.4
Liu, Q.5
Sun, X.6
-
12
-
-
84863392301
-
Hasbe: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
-
April
-
Z. Wan, J. Liu and R. H. Deng, HASBE: A Hierarchical Attribute-based Solution for Flexible and Scalable Access Control in Cloud Computing, IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, pp. 743-754, April, 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.2
, pp. 743-754
-
-
Wan, Z.1
Liu, J.2
Deng, R.H.3
-
13
-
-
84866619747
-
Secure overlay cloud storage with access control and assured deletion
-
November-December
-
Y. Tang, P. P. C. Lee, J. C. S. Lui and R. Perlman, Secure Overlay Cloud Storage with Access Control and Assured Deletion, IEEE Transactions on Dependable and Secure Computing, Vol. 9, No. 6, pp. 903-916, November-December, 2012.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.6
, pp. 903-916
-
-
Tang, Y.1
Lee, P.P.C.2
Lui, J.C.S.3
Perlman, R.4
-
14
-
-
84886903289
-
DAC-Macs: Effective data access control for multiauthority cloud storage systems
-
November
-
K. Yang, X. Jia, K. Ren, B. Zhang and R. Xie, DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems, IEEE Transactions on Information Forensics and Security, Vol. 8, No. 11, pp. 1790-1801, November, 2013.
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.11
, pp. 1790-1801
-
-
Yang, K.1
Jia, X.2
Ren, K.3
Zhang, B.4
Xie, R.5
-
15
-
-
84961742903
-
Secure and verifiable policy update outsourcing for big data access control in the cloud
-
December
-
K. Yang, X. Jia and K. Ren, Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud, IEEE Transactions on Parallel and Distributed Systems, Vol. 26, No. 12, pp. 3461-3470, December, 2015.
-
(2015)
IEEE Transactions on Parallel and Distributed Systems
, vol.26
, Issue.12
, pp. 3461-3470
-
-
Yang, K.1
Jia, X.2
Ren, K.3
-
16
-
-
84903121888
-
Expressive efficient and revocable data access control for multi-authority cloud storage
-
July
-
K. Yang and X. Jia, Expressive, Efficient, and Revocable Data Access Control for Multi-authority Cloud Storage, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 7, pp. 1735-1744, July, 2014.
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, Issue.7
, pp. 1735-1744
-
-
Yang, K.1
Jia, X.2
-
17
-
-
84891761004
-
Decentralized access control with anonymous authentication of data stored in clouds
-
February
-
S. Ruj, M. Stojmenovic and A. Nayak, Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 2, pp. 384-394, February, 2014.
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, Issue.2
, pp. 384-394
-
-
Ruj, S.1
Stojmenovic, M.2
Nayak, A.3
-
18
-
-
84922323888
-
A novel routing protocol providing good transmission reliability in underwater sensor networks
-
January
-
J. Shen, H. Tan, J. Wang, J. Wang and S. Lee, A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks, Journal of Internet Technology, Vol. 16, No. 1, pp. 171-178, January, 2015.
-
(2015)
Journal of Internet Technology
, vol.16
, Issue.1
, pp. 171-178
-
-
Shen, J.1
Tan, H.2
Wang, J.3
Wang, J.4
Lee, S.5
-
19
-
-
84992121665
-
Attribute-based access control with constant-size ciphertext in cloud computing
-
W. Teng, G. Yang, Y. Xiang, T. Zhang and D. Wang, Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing, IEEE Transactions on Cloud Computing, 2015, doi: 10.1109/TCC.2015.2440247.
-
IEEE Transactions on Cloud Computing
, vol.2015
-
-
Teng, W.1
Yang, G.2
Xiang, Y.3
Zhang, T.4
Wang, D.5
-
20
-
-
85030113648
-
Flexible data access control based on trust and reputation in cloud computing
-
Z. Yan, X. Li, M. Wang and A. V. Vasilakos, Flexible Data Access Control Based on Trust and Reputation in Cloud Computing, IEEE Transactions on Cloud Computing, Vol. 2015, 2015, doi: 10.1109/TCC.2015.2469662.
-
(2015)
IEEE Transactions on Cloud Computing
, vol.2015
-
-
Yan, Z.1
Li, X.2
Wang, M.3
Vasilakos, A.V.4
-
21
-
-
77954843911
-
Toward publicly auditable secure cloud data storage services
-
July-August
-
C. Wang, K. Ren, W. Lou and J. Li, Toward Publicly Auditable Secure Cloud Data Storage Services, IEEE Network: The Magazine of Global Internetworking, Vol. 24, No. 4, pp. 19-24, July-August, 2010.
-
(2010)
IEEE Network: The Magazine of Global Internetworking
, vol.24
, Issue.4
, pp. 19-24
-
-
Wang, C.1
Ren, K.2
Lou, W.3
Li, J.4
-
22
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
May
-
Q. Wang, C. Wang, K. Ren, W. Lou and J. Li, Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing, IEEE Transactions on Parallel and Distributed Systems, Vol. 22, No. 5, pp. 847-859, May, 2011.
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
23
-
-
84861957968
-
Toward secure and dependable storage services in cloud computing
-
April-June
-
C. Wang, Q. Wang, K. Ren, N. Cao and W. Lou, Toward Secure and Dependable Storage Services in Cloud Computing, IEEE Transactions on Services Computing, Vol. 5, No. 2, pp. 220-232, April-June, 2012.
-
(2012)
IEEE Transactions on Services Computing
, vol.5
, Issue.2
, pp. 220-232
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Cao, N.4
Lou, W.5
-
24
-
-
84861959172
-
Privacy-preserving public auditing for secure cloud storage
-
February
-
C. Wang, S. S. M. Chow, Q. Wang, K. Ren and W. Lou, Privacy-preserving Public Auditing for Secure Cloud Storage, IEEE Transactions on Computers, Vol. 62, No. 2, pp. 362-375, February, 2013.
-
(2013)
IEEE Transactions on Computers
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.S.M.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
25
-
-
84881080693
-
An efficient and secure dynamic auditing protocol for data storage in cloud computing
-
September
-
K. Yang and X. Jia, An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 9, pp. 1717-1726, September, 2013.
-
(2013)
IEEE Transactions on Parallel and Distributed Systems
, vol.24
, Issue.9
, pp. 1717-1726
-
-
Yang, K.1
Jia, X.2
-
26
-
-
84928106743
-
Mutual verifiable provable data auditing in public cloud storage
-
March
-
Y. Ren, J. Shen, J. Wang, J. Han and S. Lee, Mutual Verifiable Provable Data Auditing in Public Cloud Storage, Journal of Internet Technology, Vol. 16, No. 2, pp. 317-323, March, 2015.
-
(2015)
Journal of Internet Technology
, vol.16
, Issue.2
, pp. 317-323
-
-
Ren, Y.1
Shen, J.2
Wang, J.3
Han, J.4
Lee, S.5
-
27
-
-
84928139575
-
Enabling cloud storage auditing with key-exposure resistance
-
June
-
J. Yu, K. Ren, C. Wang and V. Varadharajan, Enabling Cloud Storage Auditing with Key-exposure Resistance, IEEE Transactions on Information Forensics and Security, Vol. 10, No. 6, pp. 1167-1179, June, 2015.
-
(2015)
IEEE Transactions on Information Forensics and Security
, vol.10
, Issue.6
, pp. 1167-1179
-
-
Yu, J.1
Ren, K.2
Wang, C.3
Varadharajan, V.4
-
28
-
-
84934283890
-
Public integrity auditing for dynamic data sharing with multiuser modification
-
August
-
J. Yuan and S. Yu, Public Integrity Auditing for Dynamic Data Sharing with Multiuser Modification, IEEE Transactions on Information Forensics and Security, Vol. 10, No. 8, pp. 1717-1726, August, 2015.
-
(2015)
IEEE Transactions on Information Forensics and Security
, vol.10
, Issue.8
, pp. 1717-1726
-
-
Yuan, J.1
Yu, S.2
-
29
-
-
84960539113
-
Verifiable auditing for outsourced database in cloud computing
-
November
-
J. Wang, X. Chen, X. Huang, I. You and Y. Xiang, Verifiable Auditing for Outsourced Database in Cloud Computing, IEEE Transactions on Computers, Vol. 64, No. 11, pp. 3293-3303, November, 2015.
-
(2015)
IEEE Transactions on Computers
, vol.64
, Issue.11
, pp. 3293-3303
-
-
Wang, J.1
Chen, X.2
Huang, X.3
You, I.4
Xiang, Y.5
-
30
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
August
-
C. Wang, N. Cao, K. Ren and W. Lou, Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data, IEEE Transactions on Parallel and Distributed Systems, Vol. 23, No. 8, pp. 1467-1479, August, 2012.
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
31
-
-
84924804821
-
Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage
-
March
-
H. Li, D. Liu, Y. Dai, T. H. Luan and X. S. Shen, Enabling Efficient Multi-keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage, IEEE Transactions on Emerging Topics in Computing, Vol. 3, No. 1, pp. 127-138, March, 2015.
-
(2015)
IEEE Transactions on Emerging Topics in Computing
, vol.3
, Issue.1
, pp. 127-138
-
-
Li, H.1
Liu, D.2
Dai, Y.3
Luan, T.H.4
Shen, X.S.5
-
32
-
-
84963939892
-
Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing
-
May
-
W. Zhang, Y. Lin, S. Xiao, J. Wu and S. Zhou, Privacy Preserving Ranked Multi-keyword Search for Multiple Data Owners in Cloud Computing, IEEE Transactions on Computers, Vol. 65, No. 5, pp. 1566-1577, May, 2016.
-
(2016)
IEEE Transactions on Computers
, vol.65
, Issue.5
, pp. 1566-1577
-
-
Zhang, W.1
Lin, Y.2
Xiao, S.3
Wu, J.4
Zhou, S.5
-
33
-
-
84962448916
-
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
-
February
-
Z. Xia, X. Wang, X. Sun and Q. Wang, A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data, IEEE Transactions on Parallel and Distributed Systems, Vol. 27, No. 2, pp. 340-352, February, 2016.
-
(2016)
IEEE Transactions on Parallel and Distributed Systems
, vol.27
, Issue.2
, pp. 340-352
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, Q.4
-
34
-
-
84897586040
-
Toward secure multikeyword top-k retrieval over encrypted cloud data
-
July- August
-
J. Yu, P. Lu. Y. Zhu, G. Xue and M. Li, Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data, IEEE Transactions on Dependable and Secure Computing, Vol. 10, No. 4, pp. 239-250, July- August, 2013.
-
(2013)
IEEE Transactions on Dependable and Secure Computing
, vol.10
, Issue.4
, pp. 239-250
-
-
Yu, J.1
Lu, P.2
Zhu, Y.3
Xue, G.4
Li, M.5
-
35
-
-
84908108453
-
Verifiable privacy-preserving multikeyword text search in the cloud supporting similarity-based ranking
-
November
-
W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou and H. Li, Verifiable Privacy-preserving Multikeyword Text Search in the Cloud Supporting Similarity-based Ranking, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 11, pp. 3025-3035, November, 2014.
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, Issue.11
, pp. 3025-3035
-
-
Sun, W.1
Wang, B.2
Cao, N.3
Li, M.4
Lou, W.5
Hou, Y.T.6
Li, H.7
-
36
-
-
84922280033
-
Achieving efficient cloud search services: Multikeyword ranked search over encrypted cloud data supporting parallel computing
-
January
-
Z. Fu, X. Sun, Q. Liu, L. Zhou and J. Shu, Achieving Efficient Cloud Search Services: Multikeyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing, IEICE Transactions on Communications, Vol. E98-B, No. 1, pp. 190-200, January, 2015.
-
(2015)
IEICE Transactions on Communications
, vol.E98-B
, Issue.1
, pp. 190-200
-
-
Fu, Z.1
Sun, X.2
Liu, Q.3
Zhou, L.4
Shu, J.5
-
37
-
-
84905923774
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
January
-
N. Cao, C. Wang, M. Li, K. Ren and W. Lou, Privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud Data, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 1, pp. 222-233, January, 2014.
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, Issue.1
, pp. 222-233
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
38
-
-
84877786210
-
Mona: Secure multi-owner data sharing for dynamic groups in the cloud
-
June
-
X. Liu, Y. Zhang, B. Wang and J. Yan, Mona: Secure Multi-owner Data Sharing for Dynamic Groups in the Cloud, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 6, pp. 1182-1191, June, 2013.
-
(2013)
IEEE Transactions on Parallel and Distributed Systems
, vol.24
, Issue.6
, pp. 1182-1191
-
-
Liu, X.1
Zhang, Y.2
Wang, B.3
Yan, J.4
-
39
-
-
84922323123
-
A dynamic secure group sharing framework in public cloud computing
-
October-December
-
K. Xue and P. Hong, A Dynamic Secure Group Sharing Framework in Public Cloud Computing, IEEE Transactions on Cloud Computing, Vol. 2, No. 4, pp. 459-470, October-December, 2014.
-
(2014)
IEEE Transactions on Cloud Computing
, vol.2
, Issue.4
, pp. 459-470
-
-
Xue, K.1
Hong, P.2
-
40
-
-
84978741646
-
Key-aggregate searchable encryption (kase) for group data sharing via cloud storage
-
August
-
B. Cui, Z. Liu and L. Wang, Key-aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage, IEEE Transactions on Computers, Vol. 65, No. 8, pp. 2374-2385, August, 2016.
-
(2016)
IEEE Transactions on Computers
, vol.65
, Issue.8
, pp. 2374-2385
-
-
Cui, B.1
Liu, Z.2
Wang, L.3
-
41
-
-
85018200280
-
Achieving secure scalable, and fine-grained data access control in cloud computing
-
San Diego, CA
-
S. Yu, C. Wang, K. Ren and W. Lou, Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing, 29th Conference on Information Communications, San Diego, CA, 2010, pp. 534-542.
-
(2010)
29th Conference on Information Communications
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
42
-
-
84901595577
-
Digital provenance: Enabling secure data forensics in cloud computing
-
July
-
J. Li, X. Chen, Q. Huang and D. S. Wong, Digital Provenance: Enabling Secure Data Forensics in Cloud Computing, Future Generation Computer Systems, Vol. 37, pp. 259-266, July, 2014.
-
(2014)
Future Generation Computer Systems
, vol.37
, pp. 259-266
-
-
Li, J.1
Chen, X.2
Huang, Q.3
Wong, D.S.4
-
43
-
-
84928155442
-
Short dynamic group signature scheme supporting controllable linkability
-
June
-
J. Y. Hwang, L. Chen, H. S. Cho and D. Nyang, Short Dynamic Group Signature Scheme Supporting Controllable Linkability, IEEE Transactions on Information Forensics and Security, Vol. 10, No. 6, pp. 1109-1124, June, 2015.
-
(2015)
IEEE Transactions on Information Forensics and Security
, vol.10
, Issue.6
, pp. 1109-1124
-
-
Hwang, J.Y.1
Chen, L.2
Cho, H.S.3
Nyang, D.4
|