共 42 条
[1]
Azhir E., Navimipour N.J., Hosseinzadeh M., Sharifi A., Darwesh A., Query optimization mechanisms in the cloud environments: a systematic study, Int J Commun Syst, 32, 8, (2019)
[2]
Singh A., Chatterjee K., Cloud security issues and challenges: a survey, J Netw Comput Appl, 79, pp. 88-115, (2017)
[3]
Shin Y., Koo D., Hur J., A survey of secure data deduplication schemes for cloud storage systems, ACM Comput Surv, 49, 4, pp. 1-38, (2017)
[4]
Du M., Wang Q., He M., Weng J., Privacy-preserving indexing and query processing for secure dynamic cloud storage, IEEE Trans Inf Forensics Secur, 13, 9, pp. 2320-2332, (2018)
[5]
Zhang Y., Chen X., Li J., Wong D.S., Li H., You I., Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing, Inf Sci (Ny), 379, pp. 42-61, (2017)
[6]
Zhang Y., Zheng D., Deng R.H., Security and privacy in smart health: efficient policy-hiding attribute-based access control, IEEE Internet of Things Journal, 5, 3, pp. 2130-2145, (2018)
[7]
Kaaniche N., Laurent M., Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms, Comput Commun, 111, pp. 120-141, (2017)
[8]
Li Y., Gai K., Qiu L., Qiu M., Zhao H., Intelligent cryptography approach for secure distributed big data storage in cloud computing, Inf Sci (Ny), 387, pp. 103-115, (2017)
[9]
Shen J., Gui Z., Ji S., Shen J., Tan H., Tang Y., Cloudaided lightweight certificateless authentication protocol with anonymity for wireless body area networks, J Netw Comput Appl, 106, pp. 117-123, (2018)
[10]
Shen J., Wang C., Li T., Chen X., Huang X., Zhan Z.-H., Secure data uploading scheme for a smart home system, Inf Sci (Ny), 453, pp. 186-197, (2018)