Protecting user privacy for cloud computing by bivariate polynomial based secret sharing

被引:0
|
作者
Yang, Ching-Nung [1 ]
Lai, Jia-Bin [1 ]
Fu, Zhangjie [2 ]
机构
[1] Department of Computer Science and Information Engineering, National Dong Hwa University, Hualien, Taiwan
[2] School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China
关键词
Compendex;
D O I
10.2498/cit.1002593
中图分类号
学科分类号
摘要
Authentication
引用
收藏
页码:341 / 355
相关论文
共 50 条
  • [21] Framework modeling for User privacy in cloud computing
    Almtrf, Aljwhrh
    Alagrash, Yasamin
    Zohdy, Mohamed
    2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 819 - 826
  • [22] Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing
    Zhang, Leyou
    Cui, Yilei
    Mu, Yi
    IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 387 - 397
  • [23] Survey on Secret Sharing Scheme with Deduplication in Cloud Computing
    Dharani, P.
    Berlin, M. A.
    PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [24] Privacy-Preserving Data Sharing in Cloud Computing
    王慧
    JournalofComputerScience&Technology, 2010, 25 (03) : 401 - 414
  • [25] Privacy-Preserving Data Sharing in Cloud Computing
    Wang, Hui
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (03) : 401 - 414
  • [26] Data Sharing Security and Privacy Preservation in Cloud Computing
    Prasad, Kadam
    Poonam, Jadhav
    Gauri, Khupase
    Thoutam, N. C.
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1070 - 1075
  • [27] Privacy-Preserving Data Sharing in Cloud Computing
    Hui Wang
    Journal of Computer Science and Technology, 2010, 25 : 401 - 414
  • [28] Privacy-preserving image retrieval based on additive secret sharing in cloud environment
    Zhang, Bo
    Xu, Yanyan
    Yan, Yuejing
    Wang, Zhiheng
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (04): : 5021 - 5045
  • [29] A Secret Sharing Shuffling Scheme Based on Polynomial
    Zhang, Xi
    Zhang, Lei
    Zhang, Quan
    Tang, Chaojing
    2008 INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, VOLS 1-4, 2008, : 1746 - 1750
  • [30] Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing
    Loehr, Hans
    Sadeghi, Ahmad-Reza
    Vishik, Claire
    Winandy, Marcel
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 396 - +