On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

A survey on vehicular cloud computing

M Whaiduzzaman, M Sookhak, A Gani… - Journal of Network and …, 2014 - Elsevier
Vehicular networking has become a significant research area due to its specific features and
applications such as standardization, efficient traffic management, road safety and …

Oruta: Privacy-preserving public auditing for shared data in the cloud

B Wang, B Li, H Li - IEEE transactions on cloud computing, 2014 - ieeexplore.ieee.org
With cloud data services, it is commonplace for data to be not only stored in the cloud, but
also shared across multiple users. Unfortunately, the integrity of cloud data is subject to …

Vehicular cloud computing: Architectures, applications, and mobility

A Boukerche, E Robson - Computer networks, 2018 - Elsevier
Intelligent transportation systems are designed to provide innovative applications and
services relating to traffic management, as well as to facilitate the access to information for …

Panda: Public auditing for shared data with efficient user revocation in the cloud

B Wang, B Li, H Li - IEEE Transactions on services computing, 2013 - ieeexplore.ieee.org
With data storage and sharing services in the cloud, users can easily modify and share data
as a group. To ensure shared data integrity can be verified publicly, users in the group need …

[图书][B] Dynamic remote data auditing for securing big data storage in cloud computing

M Sookhak - 2015 - search.proquest.com
Nowadays, organizations produce a huge amount of sensitive data, such as personal
information, financial data, and electronic health records. Consequently, the amount of …

Remote data checking using provable data possession

G Ateniese, R Burns, R Curtmola, J Herring… - ACM Transactions on …, 2011 - dl.acm.org
We introduce a model for provable data possession (PDP) that can be used for remote data
checking: A client that has stored data at an untrusted server can verify that the server …

Dynamic proofs of retrievability via oblivious RAM

D Cash, A Küpçü, D Wichs - Journal of Cryptology, 2017 - Springer
Proofs of retrievability allow a client to store her data on a remote server (eg,“in the cloud”)
and periodically execute an efficient audit protocol to check that all of the data are being …

LT codes-based secure and reliable cloud storage service

N Cao, S Yu, Z Yang, W Lou… - 2012 Proceedings IEEE …, 2012 - ieeexplore.ieee.org
With the increasing adoption of cloud computing for data storage, assuring data service
reliability, in terms of data correctness and availability, has been outstanding. While …

云安全研究进展综述

俞能海, 郝卓, 徐甲甲, 张卫明, 张驰 - 电子学报, 2013 - ejournal.org.cn
随着云计算在学术界和工业界的兴起, 云计算也不可避免的带来了一些安全问题.
本文对云计算的安全需求进行了总结, 指出云计算不仅在机密性, 数据完整性 …