메뉴 건너뛰기




Volumn 83, Issue , 2018, Pages 208-218

Fog-based storage technology to fight with cyber threat

Author keywords

Cloud computing; Cloud storage; Cyber security; Fog computing

Indexed keywords

CLOUD COMPUTING; DATA PRIVACY; DIGITAL STORAGE; FOG; MOBILE DEVICES; MOBILE SECURITY;

EID: 85040682686     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2017.12.036     Document Type: Article
Times cited : (79)

References (41)
  • 1
    • 85028345951 scopus 로고    scopus 로고
    • Knowledge-aware proactive nodes selection approach for energy management in Internet of Things
    • Liu, X., Zhao, S., Liu, A., Xiong, N., Vasilakos, A.V., Knowledge-aware proactive nodes selection approach for energy management in Internet of Things. Future Gener. Comput. Syst., 2017, 10.1016/j.future.2017.07.022.
    • (2017) Future Gener. Comput. Syst.
    • Liu, X.1    Zhao, S.2    Liu, A.3    Xiong, N.4    Vasilakos, A.V.5
  • 2
    • 85059047985 scopus 로고    scopus 로고
    • Context-aware collect data with energy efficient in cyber-physical cloud systems
    • Liu, Y., Liu, A., Guo, S., Li, Z., Choi, Y.-J., Sekiya, H., Context-aware collect data with energy efficient in cyber-physical cloud systems. Future Gener. Comput. Syst., 2017, 10.1016/j.future.2017.05.029.
    • (2017) Future Gener. Comput. Syst.
    • Liu, Y.1    Liu, A.2    Guo, S.3    Li, Z.4    Choi, Y.-J.5    Sekiya, H.6
  • 3
    • 85020892568 scopus 로고    scopus 로고
    • Forensic data acquisition from cloud-of-things devices: windows smartphones as a case study
    • Cahyani, N.D.W., Martini, B., Choo, K.-K.R., Al-Azhar, A., Forensic data acquisition from cloud-of-things devices: windows smartphones as a case study. Concurr. Comput.: Pract. Exper. 29:14 (2017), 1–16.
    • (2017) Concurr. Comput.: Pract. Exper. , vol.29 , Issue.14 , pp. 1-16
    • Cahyani, N.D.W.1    Martini, B.2    Choo, K.-K.R.3    Al-Azhar, A.4
  • 4
    • 84920152770 scopus 로고    scopus 로고
    • Distributed filesystem forensics: XtreemFS as a case study
    • Martini, B., Choo, K.-K.R., Distributed filesystem forensics: XtreemFS as a case study. Digit. Investigation 11:4 (2014), 295–313.
    • (2014) Digit. Investigation , vol.11 , Issue.4 , pp. 295-313
    • Martini, B.1    Choo, K.-K.R.2
  • 5
    • 85011545453 scopus 로고    scopus 로고
    • Visualizing digital forensic datasets: a proof of concept
    • Tassone, C.F., Martini, B., Choo, K.-K.R., Visualizing digital forensic datasets: a proof of concept. J. Forensic Sci. 62:5 (2017), 1197–1204.
    • (2017) J. Forensic Sci. , vol.62 , Issue.5 , pp. 1197-1204
    • Tassone, C.F.1    Martini, B.2    Choo, K.-K.R.3
  • 6
    • 85002778113 scopus 로고    scopus 로고
    • Digital forensics in the cloud era: the decline of passwords and the need for legal reform
    • Martini, B., Do, Q., Raymond Choo, K.-K., Digital forensics in the cloud era: the decline of passwords and the need for legal reform. Trends Issues Crime Criminal Justice 1:512 (2016), 1–16.
    • (2016) Trends Issues Crime Criminal Justice , vol.1 , Issue.512 , pp. 1-16
    • Martini, B.1    Do, Q.2    Raymond Choo, K.-K.3
  • 7
    • 84875587046 scopus 로고    scopus 로고
    • Cloud computing and its implications for cybercrime investigations in australia
    • Hooper, C., Martini, B., Choo, K.-K.R., Cloud computing and its implications for cybercrime investigations in australia. Comput. Law Secur. Rev. 29:2 (2013), 152–163.
    • (2013) Comput. Law Secur. Rev. , vol.29 , Issue.2 , pp. 152-163
    • Hooper, C.1    Martini, B.2    Choo, K.-K.R.3
  • 8
    • 85009512540 scopus 로고    scopus 로고
    • Digital forensic intelligence: data subsets and open source intelligence (DFINT+ OSINT): a timely and cohesive mix
    • Quick, D., Choo, K.-K.R., Digital forensic intelligence: data subsets and open source intelligence (DFINT+ OSINT): a timely and cohesive mix. Future Gener. Comput. Syst. 78 (2018), 558–567.
    • (2018) Future Gener. Comput. Syst. , vol.78 , pp. 558-567
    • Quick, D.1    Choo, K.-K.R.2
  • 9
    • 84994100951 scopus 로고    scopus 로고
    • Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study
    • Teing, Y.-Y., Dehghantanha, A., Choo, K.-K.R., Yang, L.T., Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study. Comput. Electr. Eng. 58 (2017), 350–363.
    • (2017) Comput. Electr. Eng. , vol.58 , pp. 350-363
    • Teing, Y.-Y.1    Dehghantanha, A.2    Choo, K.-K.R.3    Yang, L.T.4
  • 10
    • 85029605430 scopus 로고    scopus 로고
    • A foggy research future: Advances and future opportunities in fog computing research
    • Choo, K.-K.R., Lu, R., Chen, L., Yi, X., A foggy research future: Advances and future opportunities in fog computing research. Future Gener. Comput. Syst. 78 (2018), 677–697.
    • (2018) Future Gener. Comput. Syst. , vol.78 , pp. 677-697
    • Choo, K.-K.R.1    Lu, R.2    Chen, L.3    Yi, X.4
  • 11
    • 85026636505 scopus 로고    scopus 로고
    • From cloud to fog computing: A review and a conceptual live VM migration framework
    • Osanaiye, O., Chen, S., Yan, Z., Lu, R., Choo, K., Dlodlo, M., From cloud to fog computing: A review and a conceptual live VM migration framework. IEEE Access 5:99 (2017), 8284–8300.
    • (2017) IEEE Access , vol.5 , Issue.99 , pp. 8284-8300
    • Osanaiye, O.1    Chen, S.2    Yan, Z.3    Lu, R.4    Choo, K.5    Dlodlo, M.6
  • 13
    • 84975761150 scopus 로고    scopus 로고
    • Survey on secure cloud storage
    • Xiao, L., Li, Q., Liu, J., Survey on secure cloud storage. J. Data Acquis. Process. 31:3 (2016), 464–472.
    • (2016) J. Data Acquis. Process. , vol.31 , Issue.3 , pp. 464-472
    • Xiao, L.1    Li, Q.2    Liu, J.3
  • 15
    • 85027571106 scopus 로고    scopus 로고
    • LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants
    • Xie, M., Bhanja, U., Shao, J., Zhang, G., Wei, G., LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants. Inform. Sci. 420 (2017), 37–48.
    • (2017) Inform. Sci. , vol.420 , pp. 37-48
    • Xie, M.1    Bhanja, U.2    Shao, J.3    Zhang, G.4    Wei, G.5
  • 16
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • Subashini, S., Kavitha, V., A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34:1 (2011), 1–11.
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 17
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • Takabi, H., Joshi, J.B., Ahn, G.-J., Security and privacy challenges in cloud computing environments. IEEE Secur. Privacy 8:6 (2010), 24–31.
    • (2010) IEEE Secur. Privacy , vol.8 , Issue.6 , pp. 24-31
    • Takabi, H.1    Joshi, J.B.2    Ahn, G.-J.3
  • 18
    • 79951999348 scopus 로고    scopus 로고
    • Study on cloud computing security
    • Feng, D.-G., Zhang, M., Zhang, Y., Xu, Z., Study on cloud computing security. J. Softw. 22:1 (2011), 71–83.
    • (2011) J. Softw. , vol.22 , Issue.1 , pp. 71-83
    • Feng, D.-G.1    Zhang, M.2    Zhang, Y.3    Xu, Z.4
  • 20
    • 70349309706 scopus 로고    scopus 로고
    • Data security in the world of cloud computing
    • Kaufman, L.M., Data security in the world of cloud computing. IEEE Secur. Privacy 7:4 (2009), 61–64.
    • (2009) IEEE Secur. Privacy , vol.7 , Issue.4 , pp. 61-64
    • Kaufman, L.M.1
  • 21
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • IEEE
    • Wang, C., Wang, Q., Ren, K., Lou, W., Privacy-preserving public auditing for data storage security in cloud computing. Infocom, 2010 Proceedings IEEE, 2010, IEEE, 1–9.
    • (2010) Infocom, 2010 Proceedings IEEE , pp. 1-9
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 22
    • 85020435750 scopus 로고    scopus 로고
    • An efficient public auditing protocol with novel dynamic structure for cloud data
    • Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W., An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inform. Forensics Secur. 12:10 (2017), 2402–2415.
    • (2017) IEEE Trans. Inform. Forensics Secur. , vol.12 , Issue.10 , pp. 2402-2415
    • Shen, J.1    Shen, J.2    Chen, X.3    Huang, X.4    Susilo, W.5
  • 23
    • 79959557055 scopus 로고    scopus 로고
    • Addressing cloud computing security issues
    • Zissis, D., Lekkas, D., Addressing cloud computing security issues. Future Gener. Comput. Syst. 28:3 (2012), 583–592.
    • (2012) Future Gener. Comput. Syst. , vol.28 , Issue.3 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2
  • 24
    • 84986631527 scopus 로고    scopus 로고
    • A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
    • Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K., A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inform. Forensics Secur. 11:11 (2016), 2594–2608.
    • (2016) IEEE Trans. Inform. Forensics Secur. , vol.11 , Issue.11 , pp. 2594-2608
    • Xia, Z.1    Wang, X.2    Zhang, L.3    Qin, Z.4    Sun, X.5    Ren, K.6
  • 25
    • 84914110992 scopus 로고    scopus 로고
    • Secure user data in cloud computing using encryption algorithms
    • Arora, R., Parashar, A., Transforming, C.C.I., Secure user data in cloud computing using encryption algorithms. Int. J. Eng. Res. Appl. 3:4 (2013), 1922–1926.
    • (2013) Int. J. Eng. Res. Appl. , vol.3 , Issue.4 , pp. 1922-1926
    • Arora, R.1    Parashar, A.2    Transforming, C.C.I.3
  • 26
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • IEEE
    • Yu, S., Wang, C., Ren, K., Lou, W., Achieving secure, scalable, and fine-grained data access control in cloud computing. Infocom, 2010 Proceedings IEEE, 2010, IEEE, 1–9.
    • (2010) Infocom, 2010 Proceedings IEEE , pp. 1-9
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 27
    • 85017189145 scopus 로고    scopus 로고
    • A secure cloud-assisted urban data sharing framework for ubiquitous-cities
    • Shen, J., Liu, D., Shen, J., Liu, Q., Sun, X., A secure cloud-assisted urban data sharing framework for ubiquitous-cities. Pervasive Mobile Comput., 2017, 10.1016/j.pmcj.2017.03.013.
    • (2017) Pervasive Mobile Comput.
    • Shen, J.1    Liu, D.2    Shen, J.3    Liu, Q.4    Sun, X.5
  • 28
    • 77957700442 scopus 로고    scopus 로고
    • Establishing trust in cloud computing
    • Khan, K.M., Malluhi, Q., Establishing trust in cloud computing. IT Professional 12:5 (2010), 20–27.
    • (2010) IT Professional , vol.12 , Issue.5 , pp. 20-27
    • Khan, K.M.1    Malluhi, Q.2
  • 29
    • 84991088919 scopus 로고    scopus 로고
    • Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement
    • Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K., Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inform. Forensics Secur. 11:12 (2016), 2706–2716.
    • (2016) IEEE Trans. Inform. Forensics Secur. , vol.11 , Issue.12 , pp. 2706-2716
    • Fu, Z.1    Wu, X.2    Guan, C.3    Sun, X.4    Ren, K.5
  • 30
    • 84982135416 scopus 로고    scopus 로고
    • Enabling personalized search over encrypted outsourced data with efficiency improvement
    • Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F., Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27:9 (2016), 2546–2559.
    • (2016) IEEE Trans. Parallel Distrib. Syst. , vol.27 , Issue.9 , pp. 2546-2559
    • Fu, Z.1    Ren, K.2    Shu, J.3    Sun, X.4    Huang, F.5
  • 31
    • 84962448916 scopus 로고    scopus 로고
    • A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
    • Xia, Z., Wang, X., Sun, X., Wang, Q., A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27:2 (2016), 340–352.
    • (2016) IEEE Trans. Parallel Distrib. Syst. , vol.27 , Issue.2 , pp. 340-352
    • Xia, Z.1    Wang, X.2    Sun, X.3    Wang, Q.4
  • 32
    • 85077359111 scopus 로고    scopus 로고
    • Enabling semantic search based on conceptual graphs over encrypted outsourced data
    • Fu, Z., Huang, F., Sun, X., Vasilakos, A., Yang, C.-N., Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Serv. Comput., 2016, 10.1109/TSC.2016.2622697.
    • (2016) IEEE Trans. Serv. Comput.
    • Fu, Z.1    Huang, F.2    Sun, X.3    Vasilakos, A.4    Yang, C.-N.5
  • 34
    • 84940996194 scopus 로고    scopus 로고
    • Fog computing: focusing on mobile users at the edge
    • arXiv:1502.01815 [cs.NI]
    • Luan, T.H., Gao, L., Li, Z., Xiang, Y., Wei, G., Sun, L., Fog computing: focusing on mobile users at the edge. Comput. Sci., 2015 arXiv:1502.01815 [cs.NI].
    • (2015) Comput. Sci.
    • Luan, T.H.1    Gao, L.2    Li, Z.3    Xiang, Y.4    Wei, G.5    Sun, L.6
  • 36
    • 84964284114 scopus 로고    scopus 로고
    • Fog computing in healthcare internet of things: A case study on ecg feature extraction
    • IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing
    • T.N. Gia, M. Jiang, A.M. Rahmani, T. Westerlund, P. Liljeberg, H. Tenhunen, Fog computing in healthcare internet of things: A case study on ecg feature extraction, in: IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, 2015, pp. 356–363.
    • (2015) , pp. 356-363
    • Gia, T.N.1    Jiang, M.2    Rahmani, A.M.3    Westerlund, T.4    Liljeberg, P.5    Tenhunen, H.6
  • 38
    • 84922575268 scopus 로고    scopus 로고
    • Fog computing and smart gateway based communication for cloud of things
    • International Conference on Future Internet of Things and Cloud
    • M. Aazam, E.N. Huh, Fog computing and smart gateway based communication for cloud of things, in: International Conference on Future Internet of Things and Cloud, 2014, pp. 464–470.
    • (2014) , pp. 464-470
    • Aazam, M.1    Huh, E.N.2
  • 39
    • 84947260890 scopus 로고    scopus 로고
    • Maximizing real-time streaming services based on a multi-servers networking framework
    • Wang, T., Cai, Y., Jia, W., Wen, S., Wang, G., Tian, H., Chen, Y., Zhong, B., Maximizing real-time streaming services based on a multi-servers networking framework. Comput. Netw. 93:P1 (2015), 199–212.
    • (2015) Comput. Netw. , vol.93 , Issue.P1 , pp. 199-212
    • Wang, T.1    Cai, Y.2    Jia, W.3    Wen, S.4    Wang, G.5    Tian, H.6    Chen, Y.7    Zhong, B.8
  • 41
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Wang, X., Yu, H., How to break MD5 and other hash functions. Eurocrypt 3494 (2005), 19–35.
    • (2005) Eurocrypt , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.