[1]
Optimizing Information Leakage in Multicloud Storage Services, Hao Zhuang, Member, IEEE, Rameez Rahman,Pan Hui, Member, IEEE, and Karl Aberer, Member, IEEE.
DOI: 10.1109/cloudcom.2015.26
Google Scholar
[2]
Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data Ako Muhamad Abdullah MSc Computer Science –UK PhD Student in Computer Science Department of Applied Mathematics & Computer Science Eastern Mediterranean University-Cyprus ako.abdullah@univsul.edu.iq Student No. 16600094 Publication Date: June 16, (2017).
Google Scholar
[3]
Fully Homomorphic Encryption based Privacy-Preserving Data Acquisition and Computation for Contact Tracing, - Koushik Sinha; Pratham Majumder; Subhas K. Ghosh - 08 February (2021).
DOI: 10.1109/ants50601.2020.9342834
Google Scholar
[4]
A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security, - Gurpreet Singh; Supriya Volume 67– No.19, April (2013).
DOI: 10.5120/11507-7224
Google Scholar
[5]
T. G. Papaioannou, N. Bonvin, and K. Aberer, Scalia: an adaptive scheme for efficient multi-cloud storage,, in Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis. IEEE Computer Society Press, 2012, p.20.
DOI: 10.1109/sc.2012.101
Google Scholar
[6]
Z. Wu, M. Butkiewicz, D. Perkins, E. Katz-Bassett, and H. V. Madhyastha, Spanstore: Cost-effective geo-replicated storage spanning multiple cloud services,, in Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles. ACM, 2013, p.292–308.
DOI: 10.1145/2517349.2522730
Google Scholar
[7]
G. Greenwald and E. MacAskill, Nsa prism program taps into user data of apple, google and others,, The Guardian, vol. 7, no. 6, p.1–43, (2013).
Google Scholar
[8]
F. Dabek, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica, Wide-area cooperative storage with cfs,, in ACM SIGOPS Operating Systems Review, vol. 35, no. 5. ACM, 2001, p.202–215.
DOI: 10.1145/502059.502054
Google Scholar
[9]
L. P. Cox and B. D. Noble, Samsara: Honor among thieves in peer-to-peer storage,, ACM SIGOPS Operating Systems Review, vol. 37, no. 5, p.120–132, (2003).
DOI: 10.1145/1165389.945458
Google Scholar
[10]
H. Zhuang, R. Rahman, and K. Aberer, Decentralizing the cloud: How can small data centers cooperate?, in Peer-to-Peer Computing (P2P), 14-th IEEE International Conference on. Ieee, 2014, p.1–10., 2015 IEEE 7th International Conference on. IEEE, 2015, p.379–386.
DOI: 10.1109/p2p.2014.6934303
Google Scholar
[11]
S. Choy, B. Wong, G. Simon, and C. Rosenberg, A hybrid edge-cloud architecture for reducing on-demand gaming latency,, Multimedia Systems, p.1–17, (2014).
DOI: 10.1007/s00530-014-0367-z
Google Scholar
[12]
T. Zou, R. Le Bras, M. V. Salles, A. Demers, and J. Gehrke, Cloudia: a deployment advisor for public clouds,, in Proceedings of the VLDB Endowment, vol. 6, no. 2. VLDB Endowment, 2012, p.121–132.
DOI: 10.14778/2535568.2448945
Google Scholar
[13]
H. Zhuang, R. Rahman, P. Hui, and K. Aberer, Storesim: Optimizing information leakage in multi cloud storage services," in Cloud Computing Technology and Science (CloudCom)ity of resilience and privacy,, in Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, vol. 471, no. 2175. The Royal Society, 2015, p.20140862.
DOI: 10.1109/cloudcom.2015.26
Google Scholar