logo

More info
  • ReceivedNov 9, 2019
  • AcceptedFeb 4, 2020
  • PublishedJul 15, 2020

Abstract

There is no abstract available for this article.


Acknowledgment

This work was supported by the National Key RD Program of China (Grant No. 2017YFB0802000), the National Natural Science Foundation of China (Grant Nos. 61671377, 61772418, 61602378, 61802303), the Key Research and Development Program of Shaanxi (Grant No. 2019KW-053), Guangxi Cooperative Innovation Center of Cloud Computing and Big Data (Grant No. YD1903), and Sichuan Science and Technology Program (Grant No. 2017GZDZX0002). Yinghui ZHANG is supported by New Star Team of Xi'an University of Posts and Telecommunications.


References

[1] Shen W, Qin J, Yu J, et al. Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans Inf Forensic Secur, 2018, 14: 331--346. Google Scholar

[2] Zhang Y, Deng R H, Zheng D. Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT. IEEE Trans Ind Inf, 2019, 15: 5099-5108 CrossRef Google Scholar

[3] Zhang Y, Deng R, Liu X. Outsourcing Service Fair Payment based on Blockchain and its Applications in Cloud Computing. IEEE Trans Serv Comput, 2018, : 1-1 CrossRef Google Scholar

[4] Zhang Y, Yu J, Hao R. Enabling Efficient User Revocation in Identity-based Cloud Storage Auditing for Shared Big Data. IEEE Trans Dependable Secure Comput, 2018, : 1-1 CrossRef Google Scholar

[5] Li J, Yan H, Zhang Y. Certificateless public integrity checking of group shared data on cloud storage. IEEE Trans Serv Comput, 2018, : 1-1 CrossRef Google Scholar

Copyright 2020  CHINA SCIENCE PUBLISHING & MEDIA LTD.  中国科技出版传媒股份有限公司  版权所有

京ICP备14028887号-23       京公网安备11010102003388号