메뉴 건너뛰기




Volumn 2, Issue 1, 2018, Pages 3-12

A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing

Author keywords

Cloud computing; cloud storage; fog computing; privacy protection

Indexed keywords

ARTIFICIAL INTELLIGENCE; CLOUD COMPUTING; CRYPTOGRAPHY; DATA PRIVACY; DIGITAL STORAGE; FOG;

EID: 85045547948     PISSN: None     EISSN: 2471285X     Source Type: Journal    
DOI: 10.1109/TETCI.2017.2764109     Document Type: Article
Times cited : (108)

References (33)
  • 1
    • 77954051808 scopus 로고    scopus 로고
    • The NIST definition of cloud computing
    • P. Mell and T. Grance, "The NIST definition of cloud computing," Nat. Inst. Stand. Technol., vol. 53, no. 6, pp. 50-50, 2009.
    • (2009) Nat. Inst. Stand. Technol. , vol.53 , Issue.6 , pp. 50
    • Mell, P.1    Grance, T.2
  • 2
    • 84888322916 scopus 로고    scopus 로고
    • A survey of mobile cloud computing: Architecture, applications, and approaches
    • H. T. Dinh, C. Lee, D. Niyato, and P. Wang, "A survey of mobile cloud computing: Architecture, applications, and approaches," Wireless Commun. Mobile Comput., vol. 13, no. 18, pp. 1587-1611, 2013.
    • (2013) Wireless Commun. Mobile Comput. , vol.13 , Issue.18 , pp. 1587-1611
    • Dinh, H.T.1    Lee, C.2    Niyato, D.3    Wang, P.4
  • 3
    • 84907000737 scopus 로고    scopus 로고
    • Joint virtual machine and bandwidth allocation in software defined network (SDN) and cloud computing environments
    • J. Chase, R. Kaewpuang, W. Yonggang, and D. Niyato, "Joint virtual machine and bandwidth allocation in software defined network (sdn) and cloud computing environments," in Proc. IEEE Int. Conf. Commun., 2014, pp. 2969-2974.
    • (2014) Proc. IEEE Int. Conf. Commun. , pp. 2969-2974
    • Chase, J.1    Kaewpuang, R.2    Yonggang, W.3    Niyato, D.4
  • 4
    • 84907737354 scopus 로고    scopus 로고
    • Secure and privacy-preserving data storage service in public cloud
    • H. Li, W. Sun, F. Li, and B. Wang, "Secure and privacy-preserving data storage service in public cloud," J. Comput. Res. Develop., vol. 51, no. 7, pp. 1397-1409, 2014.
    • (2014) J. Comput. Res. Develop. , vol.51 , Issue.7 , pp. 1397-1409
    • Li, H.1    Sun, W.2    Li, F.3    Wang, B.4
  • 6
    • 84975761150 scopus 로고    scopus 로고
    • Survey on secure cloud storage
    • L. Xiao, Q. Li, and J. Liu, "Survey on secure cloud storage," J. Data Acquis. Process., vol. 31, no. 3, pp. 464-472, 2016.
    • (2016) J. Data Acquis. Process. , vol.31 , Issue.3 , pp. 464-472
    • Xiao, L.1    Li, Q.2    Liu, J.3
  • 7
    • 0019608784 scopus 로고
    • On sharing secrets and reed-solomon codes
    • R. J. McEliece and D. V. Sarwate, "On sharing secrets and reed-solomon codes," Commun. ACM, vol. 24, no. 9, pp. 583-584, 1981.
    • (1981) Commun. ACM , vol.24 , Issue.9 , pp. 583-584
    • McEliece, R.J.1    Sarwate, D.V.2
  • 9
    • 79951581342 scopus 로고    scopus 로고
    • Computational intelligence in wireless sensor networks: A survey
    • First Quarter
    • R. Kulkarni, A. Forster, and G. Venayagamoorthy, "Computational intelligence in wireless sensor networks: A survey," IEEE Commun. Surv. Tuts., vol. 13, no. 1, pp. 68-96, First Quarter 2011.
    • (2011) IEEE Commun. Surv. Tuts. , vol.13 , Issue.1 , pp. 68-96
    • Kulkarni, R.1    Forster, A.2    Venayagamoorthy, G.3
  • 10
    • 84986631527 scopus 로고    scopus 로고
    • A privacypreserving and copy-deterrence content-based image retrieval scheme in cloud computing
    • Nov.
    • Z. Xia, X. Wang, L. Zhang, Z. Qin, X. Sun, and K. Ren, "A privacypreserving and copy-deterrence content-based image retrieval scheme in cloud computing," IEEE Trans. Inf. Forensics Security, vol. 11, no. 11, pp. 2594-2608, Nov. 2016.
    • (2016) IEEE Trans. Inf. Forensics Security , vol.11 , Issue.11 , pp. 2594-2608
    • Xia, Z.1    Wang, X.2    Zhang, L.3    Qin, Z.4    Sun, X.5    Ren, K.6
  • 11
    • 85017189145 scopus 로고    scopus 로고
    • A secure cloud-assisted urban data sharing framework for ubiquitous-cities
    • J. Shen, D. Liu, J. Shen, Q. Liu, and X. Sun, "A secure cloud-assisted urban data sharing framework for ubiquitous-cities," Pervasive Mobile Comput., vol. 41, pp. 219-230, 2017.
    • (2017) Pervasive Mobile Comput. , vol.41 , pp. 219-230
    • Shen, J.1    Liu, D.2    Shen, J.3    Liu, Q.4    Sun, X.5
  • 12
    • 85019226137 scopus 로고    scopus 로고
    • Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data
    • Aug.
    • Z. Fu, F. Huang, K. Ren, J. Weng, and C. Wang, "Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data," IEEE Trans. Inf. Forensics Security, vol. 12, no. 8, pp. 1874-1884, Aug. 2017.
    • (2017) IEEE Trans. Inf. Forensics Security , vol.12 , Issue.8 , pp. 1874-1884
    • Fu, Z.1    Huang, F.2    Ren, K.3    Weng, J.4    Wang, C.5
  • 13
    • 85048073162 scopus 로고    scopus 로고
    • Privacy preservation cloud storage architecture research
    • J. Hou, C. Piao, and T. Fan, "Privacy preservation cloud storage architecture research," J. Hebei Acad. Sci., vol. 30, no. 2, pp. 45-48, 2013.
    • (2013) J. Hebei Acad. Sci. , vol.30 , Issue.2 , pp. 45-48
    • Hou, J.1    Piao, C.2    Fan, T.3
  • 14
    • 80051569765 scopus 로고    scopus 로고
    • A method on protection of user data privacy in cloud storage platform
    • Q. Hou, Y. Wu, W. Zheng, and G. Yang, "A method on protection of user data privacy in cloud storage platform," J. Comput. Res. Develop., vol. 48, no. 7, pp. 1146-1154, 2011.
    • (2011) J. Comput. Res. Develop. , vol.48 , Issue.7 , pp. 1146-1154
    • Hou, Q.1    Wu, Y.2    Zheng, W.3    Yang, G.4
  • 15
    • 21644433634 scopus 로고    scopus 로고
    • Xen and the art of virtualization
    • P. Barham et al., "Xen and the art of virtualization," ACM SIGOPS Oper. Syst. Rev., vol. 37, no. 5, pp. 164-177, 2003.
    • (2003) ACM SIGOPS Oper. Syst. Rev. , vol.37 , Issue.5 , pp. 164-177
    • Barham, P.1
  • 17
    • 84991088919 scopus 로고    scopus 로고
    • Toward efficient multikeyword fuzzy search over encrypted outsourced data with accuracy improvement
    • Dec.
    • Z. Fu, X. Wu, C. Guan, X. Sun, and K. Ren, "Toward efficient multikeyword fuzzy search over encrypted outsourced data with accuracy improvement," IEEE Trans. Inf. Forensics Security, vol. 11, no. 12, pp. 2706-2716, Dec. 2016.
    • (2016) IEEE Trans. Inf. Forensics Security , vol.11 , Issue.12 , pp. 2706-2716
    • Fu, Z.1    Wu, X.2    Guan, C.3    Sun, X.4    Ren, K.5
  • 18
    • 84982135416 scopus 로고    scopus 로고
    • Enabling personalized search over encrypted outsourced data with efficiency improvement
    • Sep.
    • Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, "Enabling personalized search over encrypted outsourced data with efficiency improvement," IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 9, pp. 2546-2559, Sep. 2016.
    • (2016) IEEE Trans. Parallel Distrib. Syst. , vol.27 , Issue.9 , pp. 2546-2559
    • Fu, Z.1    Ren, K.2    Shu, J.3    Sun, X.4    Huang, F.5
  • 19
    • 84962448916 scopus 로고    scopus 로고
    • A secure and dynamic multikeyword ranked search scheme over encrypted cloud data
    • Feb.
    • Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and dynamic multikeyword ranked search scheme over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340-352, Feb. 2016.
    • (2016) IEEE Trans. Parallel Distrib. Syst. , vol.27 , Issue.2 , pp. 340-352
    • Xia, Z.1    Wang, X.2    Sun, X.3    Wang, Q.4
  • 20
    • 85077359111 scopus 로고    scopus 로고
    • Enabling semantic search based on conceptual graphs over encrypted outsourced data
    • [Online]
    • Z. Fu, F. Huang, X. Sun, A. Vasilakos, and C.-N. Yang, "Enabling semantic search based on conceptual graphs over encrypted outsourced data," IEEE Trans. Serv. Comput.. [Online]. Available: http://doi.ieeecomputersociety.org/10.1109/TSC.2016.2622697
    • IEEE Trans. Serv. Comput.
    • Fu, Z.1    Huang, F.2    Sun, X.3    Vasilakos, A.4    Yang, C.-N.5
  • 22
    • 84861959172 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for secure cloud storage
    • Feb.
    • C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for secure cloud storage," IEEE Trans. Comput., vol. 62, no. 2, pp. 362-375, Feb. 2013.
    • (2013) IEEE Trans. Comput. , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.S.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 23
    • 85020435750 scopus 로고    scopus 로고
    • An efficient public auditing protocol with novel dynamic structure for cloud data
    • Oct.
    • J. Shen, J. Shen, X. Chen, X. Huang, and W. Susilo, "An efficient public auditing protocol with novel dynamic structure for cloud data," IEEE Trans. Inf. Forensics Security, vol. 12, no. 10, pp. 2402-2415, Oct. 2017.
    • (2017) IEEE Trans. Inf. Forensics Security , vol.12 , Issue.10 , pp. 2402-2415
    • Shen, J.1    Shen, J.2    Chen, X.3    Huang, X.4    Susilo, W.5
  • 24
    • 84889087663 scopus 로고    scopus 로고
    • Security and privacy for storage and computation in cloud computing
    • L. Wei et al., "Security and privacy for storage and computation in cloud computing," Inf. Sci., vol. 258, pp. 371-386, 2014.
    • (2014) Inf. Sci. , vol.258 , pp. 371-386
    • Wei, L.1
  • 25
    • 85048079156 scopus 로고    scopus 로고
    • Formulating a security layer of cloud data storage framework based on multi agent system architecture
    • R. Atan, A.M. Talib, and M. A. A. Murad, "Formulating a security layer of cloud data storage framework based on multi agent system architecture," GSTF J. Comput., vol. 1, no. 1, pp. 121-124, 2014.
    • (2014) GSTF J. Comput. , vol.1 , Issue.1 , pp. 121-124
    • Atan, R.1    Talib, A.M.2    Murad, M.A.A.3
  • 28
    • 46449122114 scopus 로고    scopus 로고
    • Wireless sensor network survey
    • J. Yick, B. Mukherjee, and D. Ghosal, "Wireless sensor network survey," Comput. Netw., vol. 52, no. 12, pp. 2292-2330, 2008.
    • (2008) Comput. Netw. , vol.52 , Issue.12 , pp. 2292-2330
    • Yick, J.1    Mukherjee, B.2    Ghosal, D.3
  • 29
    • 84947260890 scopus 로고    scopus 로고
    • Maximizing real-time streaming services based on a multi-servers networking framework
    • T. Wang et al., "Maximizing real-time streaming services based on a multi-servers networking framework," Comput. Netw., vol. 93, pp. 199-212, 2015.
    • (2015) Comput. Netw. , vol.93 , pp. 199-212
    • Wang, T.1
  • 30
    • 84978471363 scopus 로고    scopus 로고
    • Reliable wireless connections for fast-moving rail users based on a chained fog structure
    • T. Wang et al., "Reliable wireless connections for fast-moving rail users based on a chained fog structure," Inf. Sci., vol. 379, pp. 160-176, 2017.
    • (2017) Inf. Sci. , vol.379 , pp. 160-176
    • Wang, T.1
  • 32
    • 70349459300 scopus 로고    scopus 로고
    • Cloud computing: Distributed internet computing for it and scientific research
    • Sep./Oct.
    • M. D. Dikaiakos, D. Katsaros, P. Mehra, G. Pallis, and A. Vakali, "Cloud computing: Distributed internet computing for it and scientific research," IEEE Internet Comput., vol. 13, no. 5, pp. 10-13, Sep./Oct. 2009.
    • (2009) IEEE Internet Comput. , vol.13 , Issue.5 , pp. 10-13
    • Dikaiakos, M.D.1    Katsaros, D.2    Mehra, P.3    Pallis, G.4    Vakali, A.5
  • 33
    • 84966258415 scopus 로고
    • A geometric approach to the representations of the full linear group over a galois field
    • R. Steinberg, "A geometric approach to the representations of the full linear group over a galois field," Trans. Amer. Math. Soc., vol. 71, no. 2, pp. 274-282, 1951.
    • (1951) Trans. Amer. Math. Soc. , vol.71 , Issue.2 , pp. 274-282
    • Steinberg, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.