Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference22 articles.
1. Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: opportunities and challenges. Inf Sci 305:357–383
2. Xiong J, Zhang Y, Tang S, Liu X, Yao Z (2019) Secure encrypted data with authorized deduplication in cloud. IEEE Access 7:75090–75104
3. Widjava I (2011) The 10 worst cloud outages: lessons learned. Cloud business review http://www.Cbrdigital.Com/2011/06/30/the-10-worstcloud-outages-lessons-learned.Html
4. Wu S, Li K-C, Mao B, Liao M (2017) Dac: improving storage availability with deduplication-assisted cloud-of-clouds. Futur Gener Comput Syst 74:190–198
5. Zhan Q, Su J, Hu Y (2017) Research on encryption strategy in large data environment based on proxy re-encryption. Int J Big Data Intell 4(3):208–215
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献