Citation: | CHENG Hongbing, QIAN Manyun, YU Shui, “Securing Cloud Data Using a Pirate Scheme,” Chinese Journal of Electronics, vol. 26, no. 6, pp. 1289-1296, 2017, doi: 10.1049/cje.2017.09.007 |
R. Buyya, C.S. Yeo and S. Venugopal, "Cloud computing and emerging IT platforms:Vision, hype, and reality for delivering computing as the 5th utility", Future Generation Computer Systems, Vol.25, No.6, pp.599-616, 2009.
|
D. Kusnetzky, "What is big Data?", available at http://blogs.zdnet.com/virtualization/?p=1708, 2015-12-22.
|
S. Pearson and G. Yee, "Privacy and security for cloud computing", Springer London, 2013.
|
A. Bessani, M. Correia and B. Quaresma, "DepSky:Dependable and secure storage in a cloud-of-clouds", ACM Transactions on Storage, Vol.9, No.4, pp.12-21, 2013.
|
C. Wang, Q. Wang and K. Ren, "Toward secure and dependable storage services in cloud computing", IEEE Transactions on Services Computing, Vol.5, No.2, pp.220-232, 2012.
|
H. Cheng, C. Rong, et al., "Secure data storage and sharing scheme for cloud tenants", China Communications. Vol.12, No.6, pp.106-115, 2015.
|
H. Li, B. Wang and B. Li, "Oruta:Privacy-preserving public auditing for shared data in the cloud", IEEE Transactions on Cloud Computing, Vol.2, No.1, pp.43-56, 2014.
|
D. Patterson, G. Gibson and R. Katz, "The case for RAID:Redundant arrays of inexpensive disks", Proceeding of ACM SIGMOD, 2013.
|
N. Sammeta, R.J. Kannan and L. Parthiban, "Enhanced trusted third party for cyber security in multi cloud storage", ICT and Critical Infrastructure:Proceedings of the 48th Annual Convention of Computer Society of India, 2014.
|
Z. Tan, U.T. Nagar and X. He, "Enhancing big data security with collaborative intrusion detection", IEEE Cloud Computing, Vol.1, No.3, pp.27-33, 2015.
|
X. Zhang, W. Dou and J. Pei, "Proximity-aware local-recoding anonymization with MapReduce for scalable big data privacy preservation in cloud", IEEE Transactions on Computers, Vol.64, No.8, pp.2293-2307, 2015.
|
H. Li, Y. Yang and Luan Tom, "Enabling fine-grained multikeyword search supporting classified sub-dictionaries over encrypted cloud data", IEEE Transactions on Dependable and Secure Computing, Vol.13, No.3, pp.312-325, 2016.
|
S. Niu, S. TU and Y. Huang, "An effective and secure access control system scheme in the cloud", Chinese Journal of Electronics, Vol.24, No.3, pp.524-528, 2015.
|
Amazon, "Amazon S3", available at http://aws.amazon.com/cn/s3, 2015-03-23.
|
Rackspace, "Rackspace Cloud Files", available at http://www.rackspacecloud.com/-cloudhostingproducts/files, 2015-03-26.
|