scispace - formally typeset
Journal ArticleDOI

Achieving reliable and secure services in cloud computing environments

TLDR
A Comprehensive Transmission model is proposed, by combining the Client/Server (C/S) mode and the Peer-to-Peer (P2P) mode for reliable data transmission, and a Two-Phase Resource Sharing (TPRS) protocol is designed, which mainly consists of a pre-filtering phase and a verification phase to efficiently and privately achieve authorized resource sharing in the CT model.
About
This article is published in Computers & Electrical Engineering.The article was published on 2017-04-01. It has received 68 citations till now. The article focuses on the topics: Cloud computing & Cloud computing security.

read more

Citations
More filters
Journal ArticleDOI

The security of machine learning in an adversarial setting: A survey

TL;DR: This work presents a comprehensive overview of the investigation of the security properties of ML algorithms under adversarial settings, and analyze the ML security model to develop a blueprint for this interdisciplinary research area.
Journal ArticleDOI

Fog-Based Computing and Storage Offloading for Data Synchronization in IoT

TL;DR: This paper proposes a new architecture for data synchronization based on fog computing, and designs a differential synchronization algorithm that has better performance than traditional cloud-based solutions in terms of both efficiency and security.
Journal ArticleDOI

A Dual Privacy Preserving Scheme in Continuous Location-Based Services

TL;DR: The proposed dual privacy preserving (DPP) scheme in continuous LBSs can enhance the users’ privacy and effectively solve the single point of failure in single anonymizer structure, and the query authentication can guarantee the correctness of the query results.
Journal ArticleDOI

Intelligent route planning on large road networks with efficiency and privacy

TL;DR: A comprehensive service framework, called BCloud-IFog, which consists of blind cloud servers and intelligent fog servers, and an Outsourced Real-time Route Planning (OR2P) scheme, where the search index is built as a G*-tree structure and each G-tree leaf node is split into a set of non-confidential outsourced graphs.
References
More filters
ReportDOI

The NIST Definition of Cloud Computing

Peter Mell, +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Journal ArticleDOI

A view of cloud computing

TL;DR: The clouds are clearing the clouds away from the true potential and obstacles posed by this computing capability.
Book ChapterDOI

Identity-Based Encryption from the Weil Pairing

TL;DR: This work proposes a fully functional identity-based encryption scheme (IBE) based on the Weil pairing that has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem.
Proceedings ArticleDOI

Ciphertext-Policy Attribute-Based Encryption

TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Proceedings ArticleDOI

A fuzzy vault scheme

TL;DR: In this article, the authors describe a fuzzy vault construction that allows Alice to place a secret value /spl kappa/ in a secure vault and lock it using an unordered set A of elements from some public universe U. If Bob tries to "unlock" the vault using B, he obtains the secret value if B is close to A, i.e., only if A and B overlap substantially.
Related Papers (5)