Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] A. Fu, S. Yu, Y. Zhang, H. Wang and C. Huang, "NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users," in IEEE Transactions on Big Data, vol. PP, no. 99, pp. 1-1. doi: 10.1109/TBDATA.2017.2701347 [1] D. Fernandes, L. Soares, J. Gomes, et al, “Security issues in cloud environments: a survey,†International Journal of Information Security, vol. 12, no. 2, pp. 113-170, 2014. [2] W. Hsien, C. Yang, and M. Hwang, “A survey of public auditing for secure data storage in cloud computing,†International Journal of Network Security, vol.18, no.1, pp. 133-142, 2016. [3] J. Yu, K. Ren, C. Wang, et al, “Enabling Cloud Storage Auditing with Key-Exposure Resistance,†IEEE Transactions on Information Forensics and Security, vol.10, no.6, pp. 1167-1179, 2015. [4] Q. Wang, C. Wang, K. Ren, et al, “Enabling public auditability and data dynamics for storage security in cloud computing,†IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011. [5] S. Yu, “Big privacy: challenges and opportunities of privacy study in the age of big data,†IEEE Access, vol. 4, no. 6, pp. 2751-2763, 2016. [6] C. Wang, Q. Wang, K. Ren, et al, “Privacy-preserving public auditing for data storage security in cloud computing,†Proceedings of IEEE INFOCOM, pp. 1-9, 2010. [7] B. Wang, B. Li, and H. Li, “Oruta: privacy-preserving public auditing for shared data in the cloud,†IEEE Transactions on Cloud Computing, vol.2, no.1, pp.43-56, 2014. [8] B. Wang, B. Li, and H. Li, “Knox: privacy-preserving auditing for shared data with large groups in the cloud,†Applied Cryptography and Network Security. Springer Berlin Heidelberg, pp. 507-525, 2012. [9] B. Wang, H. Li, and M. Li, “Privacy-preserving public auditing for shared cloud data supporting group dynamics,†Proceedings of IEEE ICC, pp. 1946-1950, 2013. [10] B. Wang, B. Li, and H. Li, “Public auditing for shared data with efficient user revocation in the cloud,†Proceedings of IEEE INFOCOM, pp. 2904- 2912, 2013. [11] B. Wang, B. Li, and H. Li, “Panda: Public auditing for shared data with efficient user revocation in the cloud,†IEEE Transactions on Services Computing, vol.8, no.1, pp. 92-106, 2015. [12] C. Liu, J. Chen, L. Yang, et al, “Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates,†IEEE Transactions on Parallel and Distributed Systems, vol.25, no.9, pp. 2234-2244, 2014. [13] H. Wang, and Y. Zhang, “On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage,†IEEE Transactions on Parallel and Distributed Systems, vol.25, no.1, pp. 264-267, 2014. [14] L. Huang, G. Zhang, and A. Fu, “Privacy-preserving public auditing for dynamic group based on hierarchical tree,†Journal of Computer Research and Development, vol.53, no.10, pp. 2334-2342, 2016. [15] Y. Yu, J. Ni, M. Au, et al, “Comments on a public auditing mechanism for shared cloud data service,†IEEE Transactions on Services Computing,vol.8, no.6, pp. 998-999 2015. [16] G. Ateniese, R. Burns, R. Curtmola, et al, “Provable data possession at untrusted stores,†Proceedings of ACM CCS, pp. 598-609, 2007. [17] A. Juels, and B. Kaliski, “PORs: Proofs of retrievability for large files,†Proceedings of ACM CCS, pp. 584-597, 2007. [18] Y. Yu, M. H. Au, and Y. Mu, “Enhanced privacy of a remote data integrity-checking protocol,†International Journal of Information Security, vol. 14, no. 4, pp. 307-318, 2015. [19] J. Yuan, and S. Yu, “Efficient public integrity checking for cloud data sharing with multi-user modification,†Proceedings of IEEE INFOCOM, pp. 2121-2129, 2014. [20] H. Wang, “Identity-based distributed provable data possession in multicolored storage,†IEEE Transactions on Services Computing, vol.8, no.2, pp.328-340, 2015. [21] L. Huang, G. Zhang, A. Fu, “Certificateless Public Verification Scheme with Privacy-preserving and Message Recovery for Dynamic Group,†Proceedings of ACSW, 2017. [22] T. Jiang, X. Chen, and J. Ma, “Public integrity auditing for shared dynamic cloud data with group user revocation,†IEEE Transactions on Computers, vol.65, no.8, pp.2363-2373, 2016. [23] H. Wang, “Proxy Provable Data Possession in Public Clouds,†IEEE Transactions on Services Computing, vol.6, no.4, pp.551-559, 2013. [24] Y. Yu, Y. L, J. N, et al., “Comments on public integrity auditing for dynamic data sharing with multiuser modification,†IEEE Transactions on Information Forensics and Security, vol.11, no.3, pp.658-659, 2016. [25] H. Jin, D. Wong, and Y. Xu, “Efficient group signature with forward secure revocation,†Security Technology. Springer Berlin Heidelberg, pp. 124-131, 2009. [26] Mr. M. VEERABRAHMA CHARY, Mrs.N.SUJATHA,†A Novel Additive Multi-Keyword Search for Multiple Data Owners in Cloud Computing .†International Journal of Computer Engineering In Research Trends., vol.3, no.6, pp. 308-313, 2016. [27] G.Lucy, D.Jaya Narayana Reddy, R.Sandeep Kumar,†Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data.†International Journal of Computer Engineering In Research Trends., vol.2, no.12, pp. 919-923, 2015. [28] G.Dileep Kumar, A.Sreenivasa Rao,†Privacy-Preserving Public Auditing using TPA for Secure Searchable Cloud Storage data.†International Journal of Computer Engineering In Research Trends., vol.2, no.11, pp. 767-770, 2015. [29] N. Meghasree, U.Veeresh, Dr.S.Prem Kumar,†Multi Cloud Architecture to Provide Data Privacy and Integrity.†International Journal of Computer Engineering In Research Trends., vol.2, no.9, pp. 558-564, 2015. [30] P.FARZANA, A.HARSHAVARDHAN,†Integrity Auditing for Outsourced Dynamic Cloud Data with Group User Revocation.†International Journal of Computer Engineering In Research Trends., vol.2, no.11, pp. 877-881, 2015.
![]() | V4I8009.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|