Learn More
To protect cloud data against corruption, enabling data integrity checking along with error recovery becomes quite critical. Recently, regenerating code has caught researchers’ attention due to low repair traffic while preserving fault tolerance. Existing integrity checking schemes for regenerating code storage only support static data and have high(More)
Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes offers a new mechanism for exploiting the mobile devices that many users already carry. However, forwarding messages in such a network is trapped by many particular challenges, and some protocols have contributed to solve them partly. In this(More)
Cloud storage enables users to remotely store their data and share the data through the cloud. Existing integrity auditing schemes for shared data are often not identity-preserving and have high auditing cost, and hence are still far from practical application. In this work, we propose a public auditing scheme for shared data in cloud storage with identity(More)
Software defined networking (SDN) has emerged as an efficient network technology for lowering operating cost through simplified hardware, software and management. Specific research focus has been placed to achieve a successful carrier grade network with SDN, in terms of scalability, reliability, QoS and service management. In this paper, graph theory and(More)
Ciphertext-policy attribute-based encryption is becoming a cryptographic solution to realize fine-grained access control. However, some important problems have not been effectively solved yet such as (i) low efficiency of dynamic change of a user or his attribute and (ii) high computation cost at user end. In this paper, we propose an access control scheme(More)
Storage auditing and client-side deduplication techniques have been proposed to assure data integrity and improve storage efficiency, respectively. Recently, a few schemes start to consider these two different aspects together. However, these schemes either only support plaintext data file or have been proved insecure. In this paper, we propose a public(More)
Auction mechanisms have recently been studied as an efficient approach for dynamic resource allocation in a cloud market. Existing mechanisms are mostly limited to the offline setting or execute jobs in continuous time slots. This work focuses on a practical case of online auction design, where users bid for future cloud resources for executing their batch(More)
  • 1