-
2
-
-
84862907810
-
Security challenges for the public cloud
-
K. Ren, C. Wang, and Q. Wang, “Security challenges for the public cloud,” IEEE Internet Computing, Vol. 16, 2012, pp. 69-73.
-
(2012)
IEEE Internet Computing
, vol.16
, pp. 69-73
-
-
Ren, K.1
Wang, C.2
Wang, Q.3
-
3
-
-
77950347409
-
A view of cloud computing
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A view of cloud computing,” Communications of the ACM, Vol. 53, 2010, pp. 50-58.
-
(2010)
Communications of The ACM
, vol.53
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
4
-
-
85028448989
-
A secure identity-based dynamic group data sharing scheme for cloud computing
-
J. Shen, D. Liu, C. Lai, Y. Ren, and X. Sun, “A secure identity-based dynamic group data sharing scheme for cloud computing,” Journal of Internet Technology, Vol. 18, 2016, DOI: 10.6138/JIT.2017.18.4.20160415.
-
(2016)
Journal of Internet Technology
, vol.18
-
-
Shen, J.1
Liu, D.2
Lai, C.3
Ren, Y.4
Sun, X.5
-
6
-
-
85017189145
-
A secure cloud-assisted urban data sharing framework for ubiquitous-cities
-
J. Shen, D. Liu, J. Wang, J. Shen, Q. Liu, and X. Sun, “A secure cloud-assisted urban data sharing framework for ubiquitous-cities,” Pervasive and Mobile Computing, 2017, DOI: 10.1016/j.pmcj.2017.03.013.
-
(2017)
Pervasive and Mobile Computing
-
-
Shen, J.1
Liu, D.2
Wang, J.3
Shen, J.4
Liu, Q.5
Sun, X.6
-
7
-
-
84929085499
-
State-of-the-art survey on cloud computing security challenges, approaches and solutions
-
F. Shahzad, “State-of-the-art survey on cloud computing security challenges, approaches and solutions,” Elsevier Procedia Computer Science, Vol. 37, 2014, pp. 357-362.
-
(2014)
Elsevier Procedia Computer Science
, vol.37
, pp. 357-362
-
-
Shahzad, F.1
-
8
-
-
85020435750
-
An efficient public auditing protocol with novel dynamic structure for cloud data
-
J. Shen, J. Shen, X. Chen, X. Huang, and W. Susilo, “An efficient public auditing protocol with novel dynamic structure for cloud data,” IEEE Transactions on Information Forensics and Security, 2017, DOI: 10.1109/TIFS.2017.2705620.
-
(2017)
IEEE Transactions on Information Forensics and Security
-
-
Shen, J.1
Shen, J.2
Chen, X.3
Huang, X.4
Susilo, W.5
-
9
-
-
85010374917
-
A survey on security issues in cloud computing
-
R. Bhadauria, R. Chaki, N. Chaki, and S. Sanyal, “A survey on security issues in cloud computing,” International Journal of Engineering and Technology, Vol. 5, 2011.
-
(2011)
International Journal of Engineering and Technology
, vol.5
-
-
Bhadauria, R.1
Chaki, R.2
Chaki, N.3
Sanyal, S.4
-
10
-
-
84958124876
-
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
-
Q. Jiang, F. Wei, S. Fu, J. Ma, G. Li, and A. Alelaiwi, “Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy,” Nonlinear Dynamics, Vol. 83, 2016, pp. 2085-2101.
-
(2016)
Nonlinear Dynamics
, vol.83
, pp. 2085-2101
-
-
Jiang, Q.1
Wei, F.2
Fu, S.3
Ma, J.4
Li, G.5
Alelaiwi, A.6
-
11
-
-
84872875967
-
Identity-based key agreement protocol employing a symmetric balanced incomplete block design
-
J. Shen, S. Moh, and I. Chung, “Identity-based key agreement protocol employing a symmetric balanced incomplete block design,” Journal of Communications and Networks, Vol. 14, 2012, pp. 682-691.
-
(2012)
Journal of Communications and Networks
, vol.14
, pp. 682-691
-
-
Shen, J.1
Moh, S.2
Chung, I.3
-
12
-
-
84935865949
-
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
-
D. He, N. Kumar, and N. Chilamkurti, “A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks,” Information Sciences, Vol. 321, 2015, pp. 263-277.
-
(2015)
Information Sciences
, vol.321
, pp. 263-277
-
-
He, D.1
Kumar, N.2
Chilamkurti, N.3
-
13
-
-
84939576175
-
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
-
Q. Jiang, J. Ma, X. Lu, and Y. Tian, “An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks,” Peer-to-Peer Networking and Applications, Vol. 8, 2015, pp. 1070-1081.
-
(2015)
Peer-to-Peer Networking and Applications
, vol.8
, pp. 1070-1081
-
-
Jiang, Q.1
Ma, J.2
Lu, X.3
Tian, Y.4
-
14
-
-
84947804555
-
Enhanced secure sensor association and key management in wireless body area networks
-
J. Shen, S. Moh, and I. Chung, “Enhanced secure sensor association and key management in wireless body area networks,” Journal of Communications and Networks, Vol. 17, 2015, pp. 453-462.
-
(2015)
Journal of Communications and Networks
, vol.17
, pp. 453-462
-
-
Shen, J.1
Moh, S.2
Chung, I.3
-
15
-
-
84964246143
-
Anonymous authentication for wireless body area networks with provable security
-
D. He, S. Zeadally, N. Kumar, and J. Lee, “Anonymous authentication for wireless body area networks with provable security,” IEEE Systems Journal, 2016, DOI: 10. 1109/JSYST.2016.2544805.
-
(2016)
IEEE Systems Journal
-
-
He, D.1
Zeadally, S.2
Kumar, N.3
Lee, J.4
-
16
-
-
85038858282
-
Searchable encryption over feature-rich data
-
Q. Wang, M. He, M. Du, S. S. M. Chow, R. W. F. Lai, and Q. Zou, “Searchable encryption over feature-rich data,” IEEE Transactions on Dependable and Secure Computing, Vol. PP, 2016, DOI: 10.1109/TDSC.2016.2593444.
-
(2016)
IEEE Transactions on Dependable and Secure Computing
, vol.PP
-
-
Wang, Q.1
He, M.2
Du, M.3
Chow, S.S.M.4
Lai, R.W.F.5
Zou, Q.6
-
17
-
-
84973560504
-
An efficient RFID authentication protocol providing strong privacy and security
-
J. Shen, H. Tan, S. Moh, I. Chung, and J. Wang, “An efficient rfid authentication protocol providing strong privacy and security,” Journal of Internet Technology, Vol. 17, 2016, pp. 443-455.
-
(2016)
Journal of Internet Technology
, vol.17
, pp. 443-455
-
-
Shen, J.1
Tan, H.2
Moh, S.3
Chung, I.4
Wang, J.5
-
18
-
-
84988227377
-
Improvement of robust smart-card-based password authentication scheme
-
Q. Jiang, J. Ma, G. Li, and X. Li, “Improvement of robust smart-card-based password authentication scheme,” International Journal of Communication Systems, Vol. 28, 2015, pp. 383-393.
-
(2015)
International Journal of Communication Systems
, vol.28
, pp. 383-393
-
-
Jiang, Q.1
Ma, J.2
Li, G.3
Li, X.4
-
19
-
-
84976428104
-
Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image data
-
S. Hu, Q. Wang, J. Wang, Z. Qin, and K. Ren, “Securing SIFT: privacy-preserving outsourcing computation of feature extractions over encrypted image data,” IEEE Transactions on Image Processing, Vol. 25, 2016, pp. 3411-3425.
-
(2016)
IEEE Transactions on Image Processing
, vol.25
, pp. 3411-3425
-
-
Hu, S.1
Wang, Q.2
Wang, J.3
Qin, Z.4
Ren, K.5
-
20
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of ACM Conference on Computer and Communications Security, 2007, pp. 598-609.
-
(2007)
Proceedings of ACM Conference on Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
21
-
-
72449185582
-
Proofs of storage from homomorphic identification protocols
-
G. Ateniese, S. Kamara, and J. Katz, “Proofs of storage from homomorphic identification protocols,” Advances in Cryptology-ASIACRYPT, 2009, pp. 319-333.
-
(2009)
Advances in Cryptology-ASIACRYPT
, pp. 319-333
-
-
Ateniese, G.1
Kamara, S.2
Katz, J.3
-
23
-
-
84878998883
-
Compact proofs of retrievability
-
H. Shacham and B. Waters, “Compact proofs of retrievability,” Journal of Cryptology, Vol. 26, 2013, pp. 442-483.
-
(2013)
Journal of Cryptology
, vol.26
, pp. 442-483
-
-
Shacham, H.1
Waters, B.2
-
24
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in Proceedings of IEEE INFOCOM, 2010, pp. 1-9.
-
(2010)
Proceedings of IEEE INFOCOM
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
25
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proceedings of the 14th European Symposium on Research in Computer Security, pp. 355-370.
-
Proceedings of The 14th European Symposium on Research in Computer Security
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
26
-
-
79959325063
-
Dynamic audit services for integrity verification of outsourced storages in clouds
-
Y. Zhu, H. Wang, Z. Hu, G. Ahn, H. Hu, and S. S. Yau, “Dynamic audit services for integrity verification of outsourced storages in clouds,” in Proceedings of ACM Symposium on Applied Computing, 2011, pp. 1550-1557.
-
(2011)
Proceedings of ACM Symposium on Applied Computing
, pp. 1550-1557
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.4
Hu, H.5
Yau, S.S.6
-
27
-
-
77954843911
-
Toward publicly auditable secure cloud data storage services
-
C. Wang, K. Ren, W. Lou, and J. Li, “Toward publicly auditable secure cloud data storage services,” IEEE Network, Vol. 24, 2010, pp. 19-24.
-
(2010)
IEEE Network
, vol.24
, pp. 19-24
-
-
Wang, C.1
Ren, K.2
Lou, W.3
Li, J.4
-
28
-
-
84861959172
-
Privacy-preserving public auditing for secure cloud storage
-
C. Wang, S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” IEEE Transactions on Computers, Vol. 62, 2013, pp. 362-375.
-
(2013)
IEEE Transactions on Computers
, vol.62
, pp. 362-375
-
-
Wang, C.1
Chow, S.M.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
29
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public auditability and data dynamics for storage security in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, Vol. 22, 2011, pp. 847-859.
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
30
-
-
84861957968
-
Toward secure and dependable storage services in cloud computing
-
C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward secure and dependable storage services in cloud computing,” IEEE Transactions on Services Computing, Vol. 5, 2012, pp. 220-232.
-
(2012)
IEEE Transactions on Services Computing
, vol.5
, pp. 220-232
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Cao, N.4
Lou, W.5
-
31
-
-
84881080693
-
An efficient and secure dynamic auditing protocol for data storage in cloud computing
-
K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, Vol. 24, 2013, pp. 1717-1726.
-
(2013)
IEEE Transactions on Parallel and Distributed Systems
, vol.24
, pp. 1717-1726
-
-
Yang, K.1
Jia, X.2
-
32
-
-
84922271700
-
Oruta: Privacy-preserving public auditing for shared data in the cloud
-
B. Wang, B. Li, and H. Li, “Oruta: privacy-preserving public auditing for shared data in the cloud,” IEEE Transactions on Cloud Computing, Vol. 2, 2014, pp. 43-56.
-
(2014)
IEEE Transactions on Cloud Computing
, vol.2
, pp. 43-56
-
-
Wang, B.1
Li, B.2
Li, H.3
-
33
-
-
84942034654
-
Efficient public verification on the integrity of multi-owner data in the cloud
-
B. Wang, H. Li, X. Liu, F. Li, and X. Li, “Efficient public verification on the integrity of multi-owner data in the cloud,” Journal of Communications and Networks, Vol. 16, 2014, pp. 592-599.
-
(2014)
Journal of Communications and Networks
, vol.16
, pp. 592-599
-
-
Wang, B.1
Li, H.2
Liu, X.3
Li, F.4
Li, X.5
-
34
-
-
84906247213
-
Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates
-
C. Liu, J. Chen, L. T. Yang, X. Zhang, C. Yang, R. Ranjan, and R. Kotagiri, “Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates,” IEEE Transactions on Parallel and Distributed Systems, Vol. 25, 2014, pp. 2234-2244.
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, pp. 2234-2244
-
-
Liu, C.1
Chen, J.2
Yang, L.T.3
Zhang, X.4
Yang, C.5
Ranjan, R.6
Kotagiri, R.7
-
35
-
-
84922828826
-
Panda: Public auditing for shared data with efficient user revocation in the cloud
-
B. Wang, B. Li, and H. Li, “Panda: public auditing for shared data with efficient user revocation in the cloud,” IEEE Transactions on Services Computing, Vol. 8, 2015, pp. 92-106.
-
(2015)
IEEE Transactions on Services Computing
, vol.8
, pp. 92-106
-
-
Wang, B.1
Li, B.2
Li, H.3
-
36
-
-
84939179414
-
MuR-DPA: Top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud
-
C. Liu, R. Ranjan, C. Yang, X. Zhang, L. Wang, and J. Chen, “MuR-DPA: top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud,” IEEE Transactions on Computers, Vol. 64, 2015, pp. 2609-2622.
-
(2015)
IEEE Transactions on Computers
, vol.64
, pp. 2609-2622
-
-
Liu, C.1
Ranjan, R.2
Yang, C.3
Zhang, X.4
Wang, L.5
Chen, J.6
-
37
-
-
84947913966
-
Privacy-preserving public auditing for regenerating-code-based cloud storage
-
J. Liu, K. Huang, H. Rong, H. Wang, and M. Xian, “Privacy-preserving public auditing for regenerating-code-based cloud storage,” IEEE Transactions on Information Forensics and Security, Vol. 10, 2015, pp. 1513-1528.
-
(2015)
IEEE Transactions on Information Forensics and Security
, vol.10
, pp. 1513-1528
-
-
Liu, J.1
Huang, K.2
Rong, H.3
Wang, H.4
Xian, M.5
-
38
-
-
84933037073
-
OPoR: Enabling proof of retrievability in cloud computing with resource-constrained devices
-
J. Li, X. Tan, X. Chen, D. S. Wong, and F. Xhafa, “OPoR: enabling proof of retrievability in cloud computing with resource-constrained devices,” IEEE Transactions on Cloud Computing, Vol. 3, 2015, pp. 195-205.
-
(2015)
IEEE Transactions on Cloud Computing
, vol.3
, pp. 195-205
-
-
Li, J.1
Tan, X.2
Chen, X.3
Wong, D.S.4
Xhafa, F.5
-
39
-
-
84933037073
-
Secure auditing and deduplicat-ing data in cloud
-
J. Li, X. Tan, X. Chen, D. S. Wong, and F. Xhafa, “Secure auditing and deduplicat-ing data in cloud,” IEEE Transactions on Computers, Vol. 3, 2015, pp. 195-205.
-
(2015)
IEEE Transactions on Computers
, vol.3
, pp. 195-205
-
-
Li, J.1
Tan, X.2
Chen, X.3
Wong, D.S.4
Xhafa, F.5
-
40
-
-
84990871477
-
Certificateless public auditing scheme for cloud-assisted wireless body area networks
-
D. He, S. Zeadally, and L. Wu, “Certificateless public auditing scheme for cloud-assisted wireless body area networks,” IEEE Systems Journal, 2015, pp. 1-10.
-
(2015)
IEEE Systems Journal
, pp. 1-10
-
-
He, D.1
Zeadally, S.2
Wu, L.3
-
41
-
-
84869466694
-
Cooperative provable data possession for integrity verification in multi-cloud storage
-
Y. Zhu, H. Hu, G. Ahn, and M. Yu, “Cooperative provable data possession for integrity verification in multi-cloud storage,” IEEE Transactions on Parallel and Distributed Systems, Vol. 23, 2012, pp. 2231-2244.
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, pp. 2231-2244
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.3
Yu, M.4
-
42
-
-
84901667966
-
On the security of an efficient dynamic auditing protocol in cloud storage
-
J. Ni, Y. Yu, Y. Mu, and Q. Xia, “On the security of an efficient dynamic auditing protocol in cloud storage,” IEEE Transactions on Parallel and Distributed Systems, Vol. 25, 2014, pp. 2760-2761.
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, pp. 2760-2761
-
-
Ni, J.1
Yu, Y.2
Mu, Y.3
Xia, Q.4
|