Accès libre

Efficient Dynamic Bloom Filter Hashing Fragmentation for Cloud Data Storage

À propos de cet article

Citez

1. Hudic, A., S. Islam, P. Kieseberg, S. Rennert, E. R. Weippl. Data Confidentiality Using Fragmentation in Cloud Computing. – International Journal of Pervasive Computing and Communications, Vol. 9, March 2013, Issue 1, pp. 37-5110.1108/17427371311315743Search in Google Scholar

2. Talib, A. M. Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment. – Journal of Information Security, 2015, Issue 6, pp. 118-130.10.4236/jis.2015.62013Search in Google Scholar

3. Liu, C., R. Ranjan, C. Yang, X. Zhang, L. Wang, J. Chen. MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud. – IEEE Transactions on Computers, Vol. 64, 2015, Issue 9, pp. 2609-2622.10.1109/TC.2014.2375190Search in Google Scholar

4. Wang, C., S. S. M. Chow, Q. Wang, K. Ren, W. Lou. Privacy-Preserving Public Auditing for Secure Cloud Storage. – IEEE Transactions on Computers, Vol. 62, 2013, Issue 2, pp. 362-375.10.1109/TC.2011.245Search in Google Scholar

5. Yuan, D., X. Song, Q. Xu, M. Zhao, X. Wei, H. Wang, H. Jiang. An ORAM-Based Privacy Preserving Data Sharing Scheme for Cloud Storage. – Journal of Information Security and Applications, Elsevier, Vol. 39, 2018, pp. 1-9.10.1016/j.jisa.2018.01.002Search in Google Scholar

6. Liu, H., P. Zhang, J. Liu. Public Data Integrity Verification for Secure Cloud Storage. – Journal of Networks, Vol. 8, February 2013, Issue 2, pp. 373-380.10.4304/jnw.8.2.373-380Search in Google Scholar

7. Tian, H., Y. Chen, C.-C. Chang, H. Jiang, Y. F. Huang, Y. Chen, J. Liu. Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage. – IEEE Transactions on Services Computing, Vol. PP, 2016, Issue 99, pp. 1-14.Search in Google Scholar

8. Liu, J. K., K. Liang, W. Susilo, J. Liu, Y. Xiang. Two-Factor Data Security Protection Mechanism for Cloud Storage System. – IEEE Transactions on Computers, Vol. 65, 2016, Issue 6, pp. 1992-2004.10.1109/TC.2015.2462840Search in Google Scholar

9. Hur, J., D. Koo, Y. Shin, K. Kang. Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage. – IEEE Transactions on Knowledge and Data Engineering, Vol. 28, 2016, Issue 11, pp. 3113-3125.10.1109/TKDE.2016.2580139Search in Google Scholar

10. Batra, K., C. Sunitha, S. Kumar. An Effective Data Storage Security Scheme for Cloud Computing. – International Journal of Innovative Research in Computer and Communication Engineering, Vol. 1, June 2013, Issue 4, pp. 808-815.Search in Google Scholar

11. Han, K., Q. Li, Z. Deng. Security and Efficiency Data Sharing Scheme for Cloud Storage. – Chaos, Solitons and Fractals, Vol. 86, May 2016, pp. 107-116.10.1016/j.chaos.2016.02.010Search in Google Scholar

12. Zhou, L., V. Varadharajan, M. Hitchens. Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage. – IEEE Transactions on Information Forensics and Security, Vol. 10, 2015, Issue 11, pp. 2381-2395.10.1109/TIFS.2015.2455952Search in Google Scholar

13. Guo, L., W.-C. Yau. Efficient Secure-Channel Free Public Key Encryption with Keyword Search for EMRs In Cloud Storage. – Journal of Medical Systems, Springer, Vol. 39, February 2015, Issue 11, pp. 1-11.10.1007/s10916-014-0178-y25634700Search in Google Scholar

14. Sookhak, M., A. Gania, M. K. Khan, R. Buyya. Dynamic Remote Data Auditing for Securing Big Data Storage In Cloud Computing. – Information Sciences, Elsevier, Vol. 380, 2017, pp. 101-116.10.1016/j.ins.2015.09.004Search in Google Scholar

15. Usman, M., M. A. Jan, X. He. Cryptography-Based Secure Data Storage and Sharing Using HEVC and Public Clouds. – Information Sciences, Elsevier, 2016.10.1016/j.ins.2016.08.059Search in Google Scholar

16. Chen, R., Y. Mu, G. Yang, F. Guo, X. Wang. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage. – IEEE Transactions on Information Forensics and Security, Vol. 11, 2016, Issue 4, pp. 789-798.10.1109/TIFS.2016.2599293Search in Google Scholar

17. Yoo, S. M., J. Kim, J. H. Park, J. Nam, J. C. Ryou. Ownership-Guaranteed Security Framework for the Private Data in the Entrusted Management Environment. – Cluster Computing, Springer, Vol. 18, September 2015, Issue 3, pp. 1251-1261.10.1007/s10586-015-0474-4Search in Google Scholar

18. Sahana, S., R. Bose, D. Sarddar. Harnessing RAID Mechanism for Enhancement of Data Storage and Security on Cloud. – Brazilian Journal of Science and Technology, Springer, December 2016.10.1186/s40552-016-0024-5Search in Google Scholar

19. Khedkar, S. V., A. D. Gawande. Data Partitioning Technique to Improve Cloud Data Storage Security. – International Journal of Computer Science and Information Technologies, Vol. 5, 2014, Issue 3, pp. 3347-3350.Search in Google Scholar

20. Jiang, T., X. Chena, J. Li, D. S. Wongc, J. Maa, J. K. Liu. Towards Secure and Reliable Cloud Storage against Data Re-Outsourcing. – Future Generation Computer Systems, Elsevier, Vol. 52, November 2015, pp. 86-94.10.1016/j.future.2014.11.002Search in Google Scholar

21. Wang, W., P. Li, L. Han, S. Huang, K. Xu, C. Yu, J. Lei1. An Enhanced Erasure Code-Based Security Mechanism for Cloud Storage. – Mathematical Problems in Engineering, Hindawi Publishing Corporation, Vol. 2014, 2014, Article ID 293214, pp. 1-8.10.1155/2014/293214Search in Google Scholar

22. Wang, X. A., F. Xhafa, W. Cai, J. Ma, F. Wei. Efficient Privacy Preserving Predicate Encryption with Fine-Grained Searchable Capability for Cloud Storage. – Computers & Electrical Engineering, Elsevier, Vol. 56, November 2016, pp. 871-883.10.1016/j.compeleceng.2016.05.012Search in Google Scholar

23. Zhang, Y., C. Xu, H. Li, X. Liang. Cryptographic Public Verification of Data Integrity for Cloud Storage Systems. – IEEE Cloud Computing, Vol. 3, 2016, Issue 5, pp. 44-52.10.1109/MCC.2016.94Search in Google Scholar

24. Chen, Y.-J., L.-C. Wang, C.-H. Liao. Eavesdropping Prevention for Network Coding Encrypted Cloud Storage Systems. – IEEE Transactions on Parallel and Distributed Systems, Vol. 27, 2016, Issue 8, pp. 2261-2273.10.1109/TPDS.2015.2486772Search in Google Scholar

25. Munoz, C., P. Leone. Fragmented-Iterated Bloom Filters for Routing in Distributed Event-Based Sensor Networks. – In: International Conference on Internet and Distributed Computing Systems, Springer, Cham, 2015, pp. 248-261.10.1007/978-3-319-23237-9_22Search in Google Scholar

26. Alosaimi, W., M. Zak, K. Al-Begain, R. Alroobaea, M. Masud. Mitigation of Distributed Denial of Service Attacks in the Cloud. – Cybernetics and Information Technologies, Vol. 17, 2017, Issue 4, pp. 32-51.10.1515/cait-2017-0040Search in Google Scholar

27. Govinda, K., E. Sathiyamoorthy. Privacy Preservation of a Group and Secure Data Storage in Cloud Environment. – Cybernetics and Information Technologies, Vol. 15, 2015, Issue 1, pp. 46-54.10.1515/cait-2015-0005Search in Google Scholar

28. Brindha, K., N. Jeyanthi. Secured Document Sharing Using Visual Cryptography in Cloud Data Storage. – Cybernetics and Information Technologies, Vol. 15, 2015, Issue 4, pp. 111-123.10.1515/cait-2015-0058Search in Google Scholar

29. Li, Y., B. Dong. The Algebraic Operations and Their Implementation Based on a Two-Layer Cloud Data Model. – Cybernetics and Information Technologies, Vol. 16, 2016, Issue 6, pp. 5-26.10.1515/cait-2016-0074Search in Google Scholar

30. Tu, S.-S., S.-Z. Niu, M.-J. Li. An Efficient Access Control Scheme for Cloud Environment. – Cybernetics and Information Technologies, Vol. 13, 2013, Issue 3, pp. 77-90.10.2478/cait-2013-0027Search in Google Scholar

eISSN:
1314-4081
Langue:
Anglais
Périodicité:
4 fois par an
Sujets de la revue:
Computer Sciences, Information Technology