[图书][B] Dynamic remote data auditing for securing big data storage in cloud computing

M Sookhak - 2015 - search.proquest.com
Nowadays, organizations produce a huge amount of sensitive data, such as personal
information, financial data, and electronic health records. Consequently, the amount of …

A survey on data center networking for cloud computing

B Wang, Z Qi, R Ma, H Guan, AV Vasilakos - Computer Networks, 2015 - Elsevier
Abstract Data Center Networks (DCNs) are an essential infrastructure that impact the
success of cloud computing. A scalable and efficient data center is crucial in both the …

[PDF][PDF] 互联网内生安全体系结构研究进展

徐恪, 付松涛, 李琦, 刘冰洋, 江伟玉, 吴波, 冯学伟 - 计算机学报, 2021 - 159.226.43.17
摘要随着互联网不断发展, 网络功能逐步走向万物互联下自动交互与控制, 大数据, 云计算,
边缘计算等技术不断深入应用, 传统网络面临的源地址欺骗, DDoS 攻击, 路由劫持等安全问题 …

A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks

RH Jhaveri, NM Patel - Wireless Networks, 2015 - Springer
Wireless shared medium, randomly moving nodes and multi-hop architecture make mobile
ad hoc networks vulnerable to various network layer threats. Grayhole attack is such a …

Detecting domain‐flux botnet based on DNS traffic features in managed network

DT Truong, G Cheng - Security and Communication Networks, 2016 - Wiley Online Library
Modern botnets such as Zeus and Conficker commonly utilize a technique called domain
fluxing or a domain generation algorithm to generate a large number of pseudo‐random …

kBF: Towards approximate and bloom filter based key-value storage for cloud computing systems

S Xiong, Y Yao, S Li, Q Cao, T He, H Qi… - … on Cloud Computing, 2014 - ieeexplore.ieee.org
As one of the most popular cloud services, data storage has attracted great attention in
recent research efforts. Key-value (kv) stores have emerged as a popular option for storing …

IPad: ID-based public auditing for the outsourced data in the standard model

J Zhang, P Li, J Mao - Cluster Computing, 2016 - Springer
Cloud storage is an important cloud computing service, it allows data users to store and
access their files anytime, from anywhere and with any device. To ensure the security of the …

Optimal coding and allocation for perfect secrecy in multiple clouds

P Hu, CW Sung, SW Ho… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
For a user to store data in the cloud, using services provided by multiple cloud storage
providers (CSPs) is a promising approach to increase the level of data availability and …

Mobile RFID system in the presence of denial-of-service attacking signals

JH Sarker, AM Nahhas - IEEE Transactions on Automation …, 2016 - ieeexplore.ieee.org
In a mobile radio-frequency identification (RFID) system, tagged items enter and leave the
reader's field at a constant speed. The possibility of tags leaving the reader's interrogation …

Iaso: an autonomous fault-tolerant management system for supercomputers

K Lu, X Wang, G Li, R Wang, W Chi, Y Liu… - Frontiers of Computer …, 2014 - Springer
With the increase of system scale, the inherent reliability of supercomputers becomes lower
and lower. The cost of fault handling and task recovery increases so rapidly that the …