메뉴 건너뛰기




Volumn 2018-May, Issue , 2018, Pages

A new fog-cloud storage framework with transparency and auditability

Author keywords

Data Audit; Fog Cloud Storage; Fog Computing; Integer Factorization; Merkle Hash Tree

Indexed keywords

ARCHITECTURE; DIGITAL STORAGE; FOG; FOG COMPUTING; TRANSPARENCY; TREES (MATHEMATICS);

EID: 85050656468     PISSN: 15503607     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2018.8422479     Document Type: Conference Paper
Times cited : (7)

References (22)
  • 3
    • 84996757871 scopus 로고    scopus 로고
    • Finding your way in the fog: Towards a comprehensive definition of fog computing
    • L. M. Vaquero and L. Rodero-Merino, "Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing, " ACM SIGCOMM Computer Communication Review, vol. 44, no. 5, pp. 27-32, 2014. [Online]. Available: http://dl. acm. org/citation. cfm?id=2677046. 2677052
    • (2014) ACM SIGCOMM Computer Communication Review , vol.44 , Issue.5 , pp. 27-32
    • Vaquero, L.M.1    Rodero-Merino, L.2
  • 5
    • 85050675741 scopus 로고    scopus 로고
    • Openfog architecture overview
    • The OpenFog Consortium Architecture Working Group, February
    • The OpenFog Consortium Architecture Working Group, "OpenFog Architecture Overview, " OpenFogConsortium, no. February, pp. 1-35, 2016. [Online]. Available: https://www. openfogconsortium. org/wpcontent/ uploads/OpenFog-Architecture-Overview-WP-2-2016. pdf
    • (2016) OpenFogConsortium , pp. 1-35
  • 6
    • 85050669477 scopus 로고    scopus 로고
    • Future directions
    • R. Mahmud and R. Buyya, "Future Directions, " in Cognitive Hypnotherapy, 2016, pp. 225-228. [Online]. Available: http://arxiv. org/abs/1611. 05539%0A
    • (2016) Cognitive Hypnotherapy , pp. 225-228
    • Mahmud, R.1    Buyya, R.2
  • 7
    • 84966662927 scopus 로고    scopus 로고
    • Assessment of the suitability of fog computing in the context of internet of things
    • S. Sarkar, S. Chatterjee, and S. Misra, "Assessment of the suitability of fog computing in the context of internet of things, " IEEE Transactions on Cloud Computing, vol. PP, no. 99, 2015.
    • (2015) IEEE Transactions on Cloud Computing , vol.PP , Issue.99
    • Sarkar, S.1    Chatterjee, S.2    Misra, S.3
  • 8
    • 85021058978 scopus 로고    scopus 로고
    • IFCIoT: Integrated fog cloud iot: A novel architectural paradigm for the future internet of things
    • A. Munir, P. Kansakar, and S. U. Khan, "IFCIoT: Integrated Fog Cloud IoT: A novel architectural paradigm for the future Internet of Things, " IEEE Consumer Electronics Magazine, vol. 6, no. 3, pp. 74-82, 2017.
    • (2017) IEEE Consumer Electronics Magazine , vol.6 , Issue.3 , pp. 74-82
    • Munir, A.1    Kansakar, P.2    Khan, S.U.3
  • 9
    • 85010075862 scopus 로고    scopus 로고
    • Optimal workload allocation in fog-cloud computing toward balanced delay and power consumption
    • R. Deng, R. Lu, C. Lai, T. H. Luan, and H. Liang, "Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption, " in IEEE Internet of Things Journal, vol. 3, no. 6, 2016, pp. 1171-1181.
    • (2016) IEEE Internet of Things Journal , vol.3 , Issue.6 , pp. 1171-1181
    • Deng, R.1    Lu, R.2    Lai, C.3    Luan, T.H.4    Liang, H.5
  • 10
    • 85015190263 scopus 로고    scopus 로고
    • Fog computing for the internet of things: Security and privacy issues
    • A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, "Fog Computing for the Internet of Things: Security and Privacy Issues, " IEEE Internet Computing, vol. 21, no. 2, pp. 34-42, 2017.
    • (2017) IEEE Internet Computing , vol.21 , Issue.2 , pp. 34-42
    • Alrawais, A.1    Alhothaily, A.2    Hu, C.3    Cheng, X.4
  • 13
    • 84939179414 scopus 로고    scopus 로고
    • MuRDPA: Top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud
    • C. Liu, R. Ranjan, C. Yang, X. Zhang, L. Wang, and J. Chen, "MuRDPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud, " IEEE Transactions on Computers, vol. 64, no. 9, pp. 2609-2622, 2015.
    • (2015) IEEE Transactions on Computers , vol.64 , Issue.9 , pp. 2609-2622
    • Liu, C.1    Ranjan, R.2    Yang, C.3    Zhang, X.4    Wang, L.5    Chen, J.6
  • 14
    • 84858284080 scopus 로고    scopus 로고
    • Data storage auditing service in cloud computing: Challenges, methods and opportunities
    • K. Yang and X. Jia, "Data storage auditing service in cloud computing: Challenges, methods and opportunities, " World Wide Web, vol. 15, no. 4, pp. 409-428, 2012.
    • (2012) World Wide Web , vol.15 , Issue.4 , pp. 409-428
    • Yang, K.1    Jia, X.2
  • 15
    • 84881080693 scopus 로고    scopus 로고
    • An efficient and secure dynamic auditing protocol for data storage in cloud computing
    • -, "An efficient and secure dynamic auditing protocol for data storage in cloud computing, " IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 9, pp. 1717-1726, 2013.
    • (2013) IEEE Transactions on Parallel and Distributed Systems , vol.24 , Issue.9 , pp. 1717-1726
    • Yang, K.1    Jia, X.2
  • 16
    • 79953294892 scopus 로고    scopus 로고
    • Enabling public auditability and data dynamics for storage security in cloud computing
    • Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling public auditability and data dynamics for storage security in cloud computing, " IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011.
    • (2011) IEEE Transactions on Parallel and Distributed Systems , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Ren, K.3    Lou, W.4    Li, J.5
  • 17
    • 84861959172 scopus 로고    scopus 로고
    • Privacypreserving public auditing for secure cloud storage
    • C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, "Privacypreserving public auditing for secure cloud storage, " IEEE Transactions on Computers, vol. 62, no. 2, pp. 362-375, 2013.
    • (2013) IEEE Transactions on Computers , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.S.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 18
    • 84928799336 scopus 로고    scopus 로고
    • External integrity verification for outsourced big data in cloud and IoT: A big picture
    • C. Liu, C. Yang, X. Zhang, and J. Chen, "External integrity verification for outsourced big data in cloud and IoT: A big picture, " Future Generation Computer Systems, vol. 49, pp. 58-67, 2015.
    • (2015) Future Generation Computer Systems , vol.49 , pp. 58-67
    • Liu, C.1    Yang, C.2    Zhang, X.3    Chen, J.4
  • 21
    • 54049123497 scopus 로고    scopus 로고
    • Double-speed safe prime generation
    • D. Naccache, "Double-speed safe prime generation, " Relation, pp. 1-2, 2003. [Online]. Available: http://citeseerx. ist. psu. edu/viewdoc/summary?doi=10. 1. 1. 10. 7139
    • (2003) Relation , pp. 1-2
    • Naccache, D.1
  • 22
    • 84895292178 scopus 로고    scopus 로고
    • Springer Science & Business Media
    • J. Katz, Digital Signatures. Springer Science & Business Media, 2010.
    • (2010) Digital Signatures
    • Katz, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.