References: [1] Wang, Tian, Zhou Jiyuan, Chen Xinlei, Wang Guojun, Liu Anfeng, and Liu Yang. (2018). A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 1-16.
[2] An, Yongkai, Lin Xiaodong, Liang Wei, Tan Gang, and Nanda Priyadarsi. (2019). A Secure Privacy Preserving Deduplication Scheme for Cloud Computing. Future Generation Computer Systems, 13(1), 68–96.
[3] Xia, X., Wang, L., Zhang, Z., Qin, X., Sun, X., and Ren, K. (2016). A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing. IEEE Transactions on Information Forensics and Security, 11(11), 2594–2608.
[4] Kulkarni, R., Forster, A., and Vinayagamoorthy, G. (2010). Computational Intelligence in Wireless Sensor Networks: A Survey. IEEE Communication Surveys & Tutorials.
[5] Li, Y., Wang, T., Wang, G., Liang, J., and Chen, H. (2016). Efficient Data Collection in Sensor-Cloud System with Multiple Mobile Sinks. In Proceedings of the 10th Asia-Pacific Services Computing Conference.
[6] McEliece, R. J., and Sarwate, D. V. (1981). On Sharing Secrets and Reed-Solomon Codes. Communications of the ACM, 24(9), 583–584.
[7] Li Hui, Sun Wenhai, Li Fenghua, and Wang Boyang. (2014). Secure and Privacy-Preserving Data Storage Service in Public Cloud. Journal on Computer Research and Development, 51(7), ISSN: 1397–1409.
[8] Xiao, L., Li, Q., and Liu, J. (2016). Survey on Secure Cloud Storage. Journal of Data Acquisition and Processing, 31(3), ISSN: 464–472.
[9] Rezapour, R., Asghari, P., Seyyed Javadi, H. H., and Ghanbari, S. (2021). Security in Fog Computing: A Systematic Review on Issues, Challenges and Solutions. Computer Science Review, 41, 100421.
[10] Kaur, Jasleen, Agrawal, Alka, and Khan, Raees Ahmad. (2020). Security Issues in Fog Environment: A Systematic Literature Review. International Journal of Wireless Information Networks, 27(3), 467-483.
[11] Ometov, A., Molua, O. L., Komarov, M., and Nurmi, J. (2022). A Survey of Security in Cloud, Edge, and Fog Computing. Sensors, 22, 927.
[12] Saad Khan., Parkinson, Simon., Qin, Yongrui. (2017). Fog Computing Security: A Review of Current Applications and Security Solutions. Journal of Cloud Computing, 6(19). |