Secure data stream outsourcing with publicly verifiable integrity in cloud storage
Tài liệu tham khảo
Gubbi, 2013, Internet of things (iot): a vision, architectural elements, and future directions, Future Gen Comput Syst, 29, 1645, 10.1016/j.future.2013.01.010
Kolozali, 2014, A knowledge-based approach for real-time iot data stream annotation and processing, 215
Ma, 2012, An efficient index for massive iot data in cloud environment, 2129
Narasimha, 2006, Authentication of outsourced databases using signature aggregation and chaining, 420
Zhang, 2015, Integridb: verifiable sql for outsourced databases, 1480
Xu, 2018, Dynamic proofs of retrievability based on partitioning-based square root oblivious ram, Comput Mater Continua, 57, 589, 10.32604/cmc.2018.03820
Feng, 2011, Study on cloud computing security, J softw, 22, 71, 10.3724/SP.J.1001.2011.03958
Wang, 2013, Privacy-preserving public auditing for secure cloud storage, IEEE Trans Comput, 62, 362, 10.1109/TC.2011.245
Wu, 2018, A distributed intrusion detection model via nondestructive partitioning and balanced allocation for big data, Comput Mater Continua, 56, 61
Schröder, 2012, Verifiable data streaming, 953
Schöder, 2015, Veristream–a framework for verifiable data streaming, 548
Krupp, 2016, Nearly optimal verifiable data streaming, 417
Xu, 2017, Dynamic chameleon authentication tree for verifiable data streaming in 5g networks, IEEE Access, 5, 26448, 10.1109/ACCESS.2017.2771281
Naor, 2000, Certificate revocation and certificate update, IEEE J Sel Areas Commun, 18, 561, 10.1109/49.839932
Li, 2006, Dynamic authenticated index structures for outsourced databases, 121
Mykletun, 2006, Authentication and integrity in outsourced databases, ACM Trans Storage (TOS), 2, 107, 10.1145/1149976.1149977
Martel, 2004, A general model for authenticated data structures, Algorithmica, 39, 21, 10.1007/s00453-003-1076-8
Tamassia, 2010, Certification and authentication of data structures
Papamanthou, 2007, Time and space efficient algorithms for two-party authenticated data structures, 1
Xu, 2018, Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures, J Netw Comput Appl, 107, 113, 10.1016/j.jnca.2018.01.014
Merkle, 1989, A certified digital signature, 218
Wang, 2015, Verifiable auditing for outsourced database in cloud computing, IEEE Trans Comput, 64, 3293, 10.1109/TC.2015.2401036
Liu, 2018, Verifiable diversity ranking search over encrypted outsourced data, Comput Mater Continua, 55, 37, 10.1016/j.commatsci.2018.07.031
Camenisch, 2002, Dynamic accumulators and application to efficient revocation of anonymous credentials, 61
Nguyen, 2005, Accumulators from bilinear pairings and applications, 275
Camenisch, 2009, An accumulator based on bilinear maps and efficient revocation for anonymous credentials, 481
Benabbas, 2011, Verifiable delegation of computation over large datasets, 111
Catalano, 2013, Vector commitments and their applications, 55
Miao, 2017, Publicly verifiable databases with efficient insertion/deletion operations, J Comput Syst Sci, 86, 49, 10.1016/j.jcss.2016.07.005
Papamanthou, 2013, Streaming authenticated data structures, 353
Stefanov, 2012, Iris: a scalable cloud file system with efficient integrity checks, 229
Yi, 2017, Dynamic authenticated method for outsourcing data stream with access control in cloud, Chin J Comput, 2, 337
Boneh, 2001, Identity-based encryption from the weil pairing, 213
Krawczyk, 2000, Chameleon signatures