Sign Up to like & get
recommendations!
0
Published in 2017 at "Soft Computing"
DOI: 10.1007/s00500-015-1918-8
Abstract: In the cloud storage framework, once clients remotely store their data on cloud storage providers, they will lose the physical control over their outsourced data. The risk of unauthorized access to the data increases dramatically.…
read more here.
Keywords:
aware merkle;
storage;
position;
cloud data ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-020-08776-y
Abstract: The recent intelligent surveillance systems provide various services that have not existed before, such as proactive predictive surveillance, through the AI-based video analysis technology. However, there are common security and privacy challenges caused by malicious…
read more here.
Keywords:
video;
blockchain based;
merkle tree;
surveillance ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Network and Service Management"
DOI: 10.1109/tnsm.2022.3219494
Abstract: Blockchain-powered smart systems deployed in different industrial applications promise operational efficiencies and improved yields, while significantly mitigating cybersecurity risks. Tradeoffs between availability and security arise at implementation, however, triggered by the additional resources (e.g., memory…
read more here.
Keywords:
blockchain;
energy;
merkle tree;
proof work ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "International Journal of Technology"
DOI: 10.14716/ijtech.v8i4.9475
Abstract: Cloud computing has revolutionized the IT industry by offering huge storage for data outsourcing and also for computation. Various security issues concerned with security and privacy of data arise in the context of data outsourcing.…
read more here.
Keywords:
search;
security;
scheme;
keyword search ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Future Internet"
DOI: 10.3390/fi11070149
Abstract: Research on digital image processing has become quite popular and rapid in recent years, and scholars have proposed various image verification mechanisms. Similarly , blockchain technology has also become very popular in recent years. This…
read more here.
Keywords:
method;
image verification;
image;
mechanism ... See more keywords