Uneingeschränkter Zugang

Efficient Dynamic Bloom Filter Hashing Fragmentation for Cloud Data Storage


Zitieren

1. Hudic, A., S. Islam, P. Kieseberg, S. Rennert, E. R. Weippl. Data Confidentiality Using Fragmentation in Cloud Computing. – International Journal of Pervasive Computing and Communications, Vol. 9, March 2013, Issue 1, pp. 37-5110.1108/17427371311315743Search in Google Scholar

2. Talib, A. M. Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment. – Journal of Information Security, 2015, Issue 6, pp. 118-130.10.4236/jis.2015.62013Search in Google Scholar

3. Liu, C., R. Ranjan, C. Yang, X. Zhang, L. Wang, J. Chen. MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud. – IEEE Transactions on Computers, Vol. 64, 2015, Issue 9, pp. 2609-2622.10.1109/TC.2014.2375190Search in Google Scholar

4. Wang, C., S. S. M. Chow, Q. Wang, K. Ren, W. Lou. Privacy-Preserving Public Auditing for Secure Cloud Storage. – IEEE Transactions on Computers, Vol. 62, 2013, Issue 2, pp. 362-375.10.1109/TC.2011.245Search in Google Scholar

5. Yuan, D., X. Song, Q. Xu, M. Zhao, X. Wei, H. Wang, H. Jiang. An ORAM-Based Privacy Preserving Data Sharing Scheme for Cloud Storage. – Journal of Information Security and Applications, Elsevier, Vol. 39, 2018, pp. 1-9.10.1016/j.jisa.2018.01.002Search in Google Scholar

6. Liu, H., P. Zhang, J. Liu. Public Data Integrity Verification for Secure Cloud Storage. – Journal of Networks, Vol. 8, February 2013, Issue 2, pp. 373-380.10.4304/jnw.8.2.373-380Search in Google Scholar

7. Tian, H., Y. Chen, C.-C. Chang, H. Jiang, Y. F. Huang, Y. Chen, J. Liu. Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage. – IEEE Transactions on Services Computing, Vol. PP, 2016, Issue 99, pp. 1-14.Search in Google Scholar

8. Liu, J. K., K. Liang, W. Susilo, J. Liu, Y. Xiang. Two-Factor Data Security Protection Mechanism for Cloud Storage System. – IEEE Transactions on Computers, Vol. 65, 2016, Issue 6, pp. 1992-2004.10.1109/TC.2015.2462840Search in Google Scholar

9. Hur, J., D. Koo, Y. Shin, K. Kang. Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage. – IEEE Transactions on Knowledge and Data Engineering, Vol. 28, 2016, Issue 11, pp. 3113-3125.10.1109/TKDE.2016.2580139Search in Google Scholar

10. Batra, K., C. Sunitha, S. Kumar. An Effective Data Storage Security Scheme for Cloud Computing. – International Journal of Innovative Research in Computer and Communication Engineering, Vol. 1, June 2013, Issue 4, pp. 808-815.Search in Google Scholar

11. Han, K., Q. Li, Z. Deng. Security and Efficiency Data Sharing Scheme for Cloud Storage. – Chaos, Solitons and Fractals, Vol. 86, May 2016, pp. 107-116.10.1016/j.chaos.2016.02.010Search in Google Scholar

12. Zhou, L., V. Varadharajan, M. Hitchens. Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage. – IEEE Transactions on Information Forensics and Security, Vol. 10, 2015, Issue 11, pp. 2381-2395.10.1109/TIFS.2015.2455952Search in Google Scholar

13. Guo, L., W.-C. Yau. Efficient Secure-Channel Free Public Key Encryption with Keyword Search for EMRs In Cloud Storage. – Journal of Medical Systems, Springer, Vol. 39, February 2015, Issue 11, pp. 1-11.10.1007/s10916-014-0178-y25634700Search in Google Scholar

14. Sookhak, M., A. Gania, M. K. Khan, R. Buyya. Dynamic Remote Data Auditing for Securing Big Data Storage In Cloud Computing. – Information Sciences, Elsevier, Vol. 380, 2017, pp. 101-116.10.1016/j.ins.2015.09.004Search in Google Scholar

15. Usman, M., M. A. Jan, X. He. Cryptography-Based Secure Data Storage and Sharing Using HEVC and Public Clouds. – Information Sciences, Elsevier, 2016.10.1016/j.ins.2016.08.059Search in Google Scholar

16. Chen, R., Y. Mu, G. Yang, F. Guo, X. Wang. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage. – IEEE Transactions on Information Forensics and Security, Vol. 11, 2016, Issue 4, pp. 789-798.10.1109/TIFS.2016.2599293Search in Google Scholar

17. Yoo, S. M., J. Kim, J. H. Park, J. Nam, J. C. Ryou. Ownership-Guaranteed Security Framework for the Private Data in the Entrusted Management Environment. – Cluster Computing, Springer, Vol. 18, September 2015, Issue 3, pp. 1251-1261.10.1007/s10586-015-0474-4Search in Google Scholar

18. Sahana, S., R. Bose, D. Sarddar. Harnessing RAID Mechanism for Enhancement of Data Storage and Security on Cloud. – Brazilian Journal of Science and Technology, Springer, December 2016.10.1186/s40552-016-0024-5Search in Google Scholar

19. Khedkar, S. V., A. D. Gawande. Data Partitioning Technique to Improve Cloud Data Storage Security. – International Journal of Computer Science and Information Technologies, Vol. 5, 2014, Issue 3, pp. 3347-3350.Search in Google Scholar

20. Jiang, T., X. Chena, J. Li, D. S. Wongc, J. Maa, J. K. Liu. Towards Secure and Reliable Cloud Storage against Data Re-Outsourcing. – Future Generation Computer Systems, Elsevier, Vol. 52, November 2015, pp. 86-94.10.1016/j.future.2014.11.002Search in Google Scholar

21. Wang, W., P. Li, L. Han, S. Huang, K. Xu, C. Yu, J. Lei1. An Enhanced Erasure Code-Based Security Mechanism for Cloud Storage. – Mathematical Problems in Engineering, Hindawi Publishing Corporation, Vol. 2014, 2014, Article ID 293214, pp. 1-8.10.1155/2014/293214Search in Google Scholar

22. Wang, X. A., F. Xhafa, W. Cai, J. Ma, F. Wei. Efficient Privacy Preserving Predicate Encryption with Fine-Grained Searchable Capability for Cloud Storage. – Computers & Electrical Engineering, Elsevier, Vol. 56, November 2016, pp. 871-883.10.1016/j.compeleceng.2016.05.012Search in Google Scholar

23. Zhang, Y., C. Xu, H. Li, X. Liang. Cryptographic Public Verification of Data Integrity for Cloud Storage Systems. – IEEE Cloud Computing, Vol. 3, 2016, Issue 5, pp. 44-52.10.1109/MCC.2016.94Search in Google Scholar

24. Chen, Y.-J., L.-C. Wang, C.-H. Liao. Eavesdropping Prevention for Network Coding Encrypted Cloud Storage Systems. – IEEE Transactions on Parallel and Distributed Systems, Vol. 27, 2016, Issue 8, pp. 2261-2273.10.1109/TPDS.2015.2486772Search in Google Scholar

25. Munoz, C., P. Leone. Fragmented-Iterated Bloom Filters for Routing in Distributed Event-Based Sensor Networks. – In: International Conference on Internet and Distributed Computing Systems, Springer, Cham, 2015, pp. 248-261.10.1007/978-3-319-23237-9_22Search in Google Scholar

26. Alosaimi, W., M. Zak, K. Al-Begain, R. Alroobaea, M. Masud. Mitigation of Distributed Denial of Service Attacks in the Cloud. – Cybernetics and Information Technologies, Vol. 17, 2017, Issue 4, pp. 32-51.10.1515/cait-2017-0040Search in Google Scholar

27. Govinda, K., E. Sathiyamoorthy. Privacy Preservation of a Group and Secure Data Storage in Cloud Environment. – Cybernetics and Information Technologies, Vol. 15, 2015, Issue 1, pp. 46-54.10.1515/cait-2015-0005Search in Google Scholar

28. Brindha, K., N. Jeyanthi. Secured Document Sharing Using Visual Cryptography in Cloud Data Storage. – Cybernetics and Information Technologies, Vol. 15, 2015, Issue 4, pp. 111-123.10.1515/cait-2015-0058Search in Google Scholar

29. Li, Y., B. Dong. The Algebraic Operations and Their Implementation Based on a Two-Layer Cloud Data Model. – Cybernetics and Information Technologies, Vol. 16, 2016, Issue 6, pp. 5-26.10.1515/cait-2016-0074Search in Google Scholar

30. Tu, S.-S., S.-Z. Niu, M.-J. Li. An Efficient Access Control Scheme for Cloud Environment. – Cybernetics and Information Technologies, Vol. 13, 2013, Issue 3, pp. 77-90.10.2478/cait-2013-0027Search in Google Scholar

eISSN:
1314-4081
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
4 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Informatik, Informationstechnik