共 150 条
[2]
Data Security Enhancement in Public Cloud Storage using Data Obfuscation and Steganography
[J].
2017 2ND WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT),
2017,
:181-184
[3]
Anuradha V P., 2014, International Conference on Information Communication and Embedded Systems (ICICES2014), P1, DOI DOI 10.1109/ICICES.2014.7033931
[4]
S-Audit: Efficient Data Integrity Verification for Cloud Storage
[J].
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE),
2018,
:465-474
[5]
Ateniese G., 2008, P 4 INT C SEC PRIV C, P1, DOI DOI 10.1145/1460877.1460889
[6]
The Cloud we Share: Access Control on Symmetrically Encrypted Data in Untrusted Clouds
[J].
IEEE ACCESS,
2020, 8 (08)
:210462-210477
[8]
Data Integrity Audit Based on Data Blinding for Cloud and Fog Environment
[J].
IEEE ACCESS,
2022, 10
:39743-39751
[10]
Bonomi F., 2012, Proceedings of the first edition of the MCC workshop on Mobile cloud computing, V1, P13, DOI [10.1145/2342509.2342513, DOI 10.1145/2342509.2342513]