Trusted Cloud Computing with Secure Resources and Data Coloring
Citations
610Â citations
Cites background from "Trusted Cloud Computing with Secure..."
...Digital Object Identifier 10.1109/TIFS.2013.2248725 the equivalence between data compression and RDH for binary covers....
[...]
432Â citations
Cites background from "Trusted Cloud Computing with Secure..."
...ing [11], [12], vector map recovery in CAD (computer-aided design) engineering graphics [13], [14], and data coloring in the cloud [15], etc....
[...]
345Â citations
Cites background or methods from "Trusted Cloud Computing with Secure..."
...Nowadays with the increasing demand of privacy protection, the ability to embed information in encrypted data will be useful in cloud computing [18]....
[...]
...Into the encrypted images, the cloud server embedded some notation, including the identities of the images' owner and the cloud server and time stamps, to manage the encrypted images, as proposed in [18]....
[...]
307Â citations
307Â citations
Cites background or methods from "Trusted Cloud Computing with Secure..."
...5 Five Major Cloud Platforms and Their Service Offerings [36]...
[...]
...For virtual storage, readers are referred to the literature [27,36,43,48,76,79]....
[...]
...Multicore CPUs and many-core GPU processors were discussed in [15,32,36]....
[...]
...To support trusted cloud services, Hwang and Li [36] have suggested building a trust overlay network to model trust relationships among data-center modules....
[...]
...(Courtesy of Hwang and Li [36] ) 250 CHAPTER 4 Cloud Platform Architecture over Virtualized Data Centers...
[...]
References
3,186Â citations
1,847Â citations
803Â citations
759Â citations
662Â citations