메뉴 건너뛰기




Volumn 33, Issue 4, 2017, Pages 891-905

Block-level message-locked encryption with polynomial commitment for IoT data

Author keywords

Deduplication; IoT data; Message locked encryption; Polynomial commitment; Smart city

Indexed keywords

DIGITAL STORAGE; INTERNET OF THINGS; LOCKS (FASTENERS); METADATA; POLYNOMIALS; PROBLEM SOLVING; SECURITY OF DATA; SMART CITY;

EID: 85049095409     PISSN: 10162364     EISSN: None     Source Type: Journal    
DOI: 10.6688/JISE.2017.33.4.2     Document Type: Article
Times cited : (10)

References (29)
  • 1
  • 3
    • 84922323888 scopus 로고    scopus 로고
    • A novel routing protocol providing good transmission reliability in underwater sensor networks
    • J. Shen, H. Tan, J. Wang, J. Wang, and S. Lee, “A novel routing protocol providing good transmission reliability in underwater sensor networks,” Journal of Internet Technology, Vol. 16, 2015, pp. 171-178.
    • (2015) Journal of Internet Technology , vol.16 , pp. 171-178
    • Shen, J.1    Tan, H.2    Wang, J.3    Wang, J.4    Lee, S.5
  • 4
    • 84986557095 scopus 로고    scopus 로고
    • Developing a secure cloud storage system for storing IoT data by applying role based encryption
    • J. D. Bokefode, A. S. Bhise, P. A. Satarkar, and D. G. Modani, “Developing a secure cloud storage system for storing IoT data by applying role based encryption,” Pro-cedia Computer Science, Vol. 89, 2016, pp. 43-50.
    • (2016) Pro-Cedia Computer Science , vol.89 , pp. 43-50
    • Bokefode, J.D.1    Bhise, A.S.2    Satarkar, P.A.3    Modani, D.G.4
  • 5
    • 84982135416 scopus 로고    scopus 로고
    • Enabling personalized search over encrypted outsourced data with efficiency improvement
    • Z. Fu, K. Ren, J. Shu, X. Sun and F. Huang, “Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement,” IEEE Transactions on Parallel and Distributed Systems, Vol. 27, 2015, pp. 2546-2559.
    • (2015) IEEE Transactions on Parallel and Distributed Systems , vol.27 , pp. 2546-2559
    • Fu, Z.1    Ren, K.2    Shu, J.3    Sun, X.4    Huang, F.5
  • 7
    • 77954695824 scopus 로고    scopus 로고
    • Cloud Security Alliance, “Top threats to cloud computing,” 2010, http://www.cloudsecurityalliance.org.
    • (2010) Top Threats to Cloud Computing
  • 11
  • 12
    • 84928106743 scopus 로고    scopus 로고
    • Mutual verifiable provable data auditing in public cloud storage
    • Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, “Mutual verifiable provable data auditing in public cloud storage,” Journal of Internet Technology, Vol. 16, 2015, pp. 317-323.
    • (2015) Journal of Internet Technology , vol.16 , pp. 317-323
    • Ren, Y.1    Shen, J.2    Wang, J.3    Han, J.4    Lee, S.5
  • 14
    • 84878475706 scopus 로고    scopus 로고
    • Proofs of retrievability with public verifiability and constant communication cost in cloud
    • J. Yuan and S. Yu, “Proofs of retrievability with public verifiability and constant communication cost in cloud,” International Workshop on Security in Cloud Computing, 2013, pp. 19-26.
    • (2013) International Workshop on Security in Cloud Computing , pp. 19-26
    • Yuan, J.1    Yu, S.2
  • 15
    • 84878998883 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • H. Shacham and B. Waters, “Compact proofs of retrievability,” Journal of Cryptology, Vol. 26, 2013, pp. 442-483.
    • (2013) Journal of Cryptology , vol.26 , pp. 442-483
    • Shacham, H.1    Waters, B.2
  • 19
    • 84943782387 scopus 로고    scopus 로고
    • BL-MLE: Block-level message-locked encryption for secure large file deduplication
    • R. Chen, Y. Mu, G. Yang, and F. Guo, “BL-MLE: Block-level message-locked encryption for secure large file deduplication,” IEEE Transactions on Information Forensics and Security, Vol. 10, 2015, pp. 2643-2652.
    • (2015) IEEE Transactions on Information Forensics and Security , vol.10 , pp. 2643-2652
    • Chen, R.1    Mu, Y.2    Yang, G.3    Guo, F.4
  • 22
    • 85049914685 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • D. Boneh and X. Boyen, “Short signatures without random oracles,” Lecture Notes in Computer Science, Vol. 3352, 2015, pp. 134-148.
    • (2015) Lecture Notes in Computer Science , vol.3352 , pp. 134-148
    • Boneh, D.1    Boyen, X.2
  • 26
    • 84903641784 scopus 로고    scopus 로고
    • Leakage resilient proofs of ownership in cloud storage, revisited
    • J. Xu and J. Zhou, “Leakage resilient proofs of ownership in cloud storage, revisited,” Applied Cryptography and Network Security, 2014, pp. 97-115.
    • (2014) Applied Cryptography and Network Security , pp. 97-115
    • Xu, J.1    Zhou, J.2
  • 29
    • 84963856290 scopus 로고    scopus 로고
    • Efficient implementation of NIST-com-pliant elliptic curve cryptography for 8-bit AVR-based sensor nodes
    • Z. Liu, H. Seo, J. Großschädl, and H. Kim, “Efficient implementation of NIST-com-pliant elliptic curve cryptography for 8-bit AVR-based sensor nodes,” IEEE Transactions on Information Forensics and Security, Vol. 11, 2015, pp. 1385-1397.
    • (2015) IEEE Transactions on Information Forensics and Security , vol.11 , pp. 1385-1397
    • Liu, Z.1    Seo, H.2    Großschädl, J.3    Kim, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.