Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Data security and privacy protection for cloud storage: A survey
P Yang, N **ong, J Ren - Ieee Access, 2020 - ieeexplore.ieee.org
The new development trends including Internet of Things (IoT), smart city, enterprises digital
transformation and world's digital economy are at the top of the tide. The continuous growth …
transformation and world's digital economy are at the top of the tide. The continuous growth …
Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions
A large number of researchers, academia, government sectors, and business enterprises
are adopting the cloud environment due to the least upfront capital investment, maximum …
are adopting the cloud environment due to the least upfront capital investment, maximum …
[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)
J Hassan, D Shehzad, U Habib… - Computational …, 2022 - Wiley Online Library
Cloud computing is a long‐standing dream of computing as a utility, where users can store
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …
Blockchain-based public auditing for big data in cloud storage
Cloud storage enables applications to efficiently manage their remote data but facing the
risk of being tampered with. This paper utilizes blockchain technique to develop a novel …
risk of being tampered with. This paper utilizes blockchain technique to develop a novel …
Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage
W Shen, J Qin, J Yu, R Hao, J Hu - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With cloud storage services, users can remotely store their data to the cloud and realize the
data sharing with others. Remote data integrity auditing is proposed to guarantee the …
data sharing with others. Remote data integrity auditing is proposed to guarantee the …
A survey of distributed denial-of-service attack, prevention, and mitigation techniques
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …
A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things
Wireless sensor networks (WSNs) play an important role in the industrial Internet of Things
(IIoT) and have been widely used in many industrial fields to gather data of monitoring area …
(IIoT) and have been widely used in many industrial fields to gather data of monitoring area …
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
Abstract Internet of Things (IoT) is an emerging technology, which makes the remote sensing
and control across heterogeneous network a reality, and has good prospects in industrial …
and control across heterogeneous network a reality, and has good prospects in industrial …
Block design-based key agreement for group data sharing in cloud computing
Data sharing in cloud computing enables multiple participants to freely share the group data,
which improves the efficiency of work in cooperative environments and has widespread …
which improves the efficiency of work in cooperative environments and has widespread …
Improving metaheuristic algorithms with information feedback models
In most metaheuristic algorithms, the updating process fails to make use of information
available from individuals in previous iterations. If this useful information could be exploited …
available from individuals in previous iterations. If this useful information could be exploited …