Author:
Rattan Punam,Swati ,Gupta Manu,Shikha
Publisher
Springer Nature Singapore
Reference23 articles.
1. Vishalakshi N S and S.Sridevi, “Survey onSecure De-duplication with Encrypted Data for Cloud Storage,” international journal of advanced science and research, Vol. 4, Issue 1, January2017.
2. Minal Bharat Pokale and Dr. Sandeep M.Chaware “De-duplication Approach with Enhance Security for Integrity” 2018 Fourth International Conference on Computing Communication Control andAutomation.
3. Halevi, D. Harnik, B. Pinkas, and A. Shulman- Peleg,“Proofsofownershipinremotestoragesystems,” in Proc. ACM Conf. Comput. Commun. Security,2011, pp.491–500.
4. JinboXiong and Yuanyuan Zhang Shaohua Tang, XimengLiu , and Zhiqiang Yao, ”Secure Encrypted Data With Authorized Deduplication in Cloud” IEEE Transactions June,2019.
5. Jain P et al (2014) Impact Analysis and Detection Method of Malicious Node Misbehavior over Mobile Ad Hoc Networks. International Journal of Computer Science and Information Technologies (IJCSIT) 5(6):7467–7470