UEPF:A blockchain based Uniform Encoding and Parsing Framework in multi-cloud environments |
Tao, Dehao
(Institute for Network Sciences and Cyberspace, Tsinghua University)
Yang, Zhen (School of Cyberspace Security, Beijing University of Posts and Telecommunications) Qin, Xuanmei (Department of Electronic Engineering, Tsinghua University) Li, Qi (Institute for Network Sciences and Cyberspace, Tsinghua University) Huang, Yongfeng (Department of Electronic Engineering, Tsinghua University) Luo, Yubo (Department of Computer Science, University of North Carolina at Chapel Hill) |
1 | Wang Jiye, Gao Lingchao, Dong Aiqiang, Guo Shaoyong, Chen Hui, Wei Xin, "Block Chain Based Data Security Sharing Network Architecture Research," Journal of Computer Research and Development, 54(4), 742-749, 2017. |
2 | Farag, Mohamed MG, Sunshin Lee, and Edward A. Fox, "Focused crawler for events," International Journal on Digital Libraries, 19.1, 3-19, 2018. DOI |
3 | M. S. Melara, A. Blankstein, J. Bonneau, E. W. Felten, and M. J. Freedman, "CONIKS: bringing key transparency to end users," in Proc. of 24th USENIX Security Symposium (USENIX Security 15), pp. 383-398, 2015 |
4 | V. Buterin, "A next-generation smart contract and decentralized application platform," white paper, 1-36, 2014. |
5 | Du Zhen-Yuan, "Personal Data Security and Supervision in the Age of Large Data," INTELLIGENT AUTOMATION AND SOFT COMPUTING, 25.4, 847-853, 2019. |
6 | A. Miller, A. Juels, E. Shi, B. Parno, and J. Katz, "Permacoin: Repurposing bitcoin work for data preservation," in Proc. of Security and Privacy (SP), 2014 IEEE Symposium on, pp. 475-490, 2014. |
7 | Brin, Sergey, and Lawrence Page, "The anatomy of a large-scale hypertextual web search engine," Computer networks and ISDN systems, 30.1-7, 107-117, 1998. DOI |
8 | Chen, Zhen-Lin, et al., "A high-speed search engine pLink 2 with systematic evaluation for proteome-scale identification of cross-linked peptides," Nature communications, 10.1, 1-12, 2019. DOI |
9 | Thelwall, Mike, "A web crawler design for data mining," Journal of Information Science, 27.5, 319-325, 2001. DOI |
10 | Kim, Tae Hyun, and Douglas Reeves, "A survey of domain name system vulnerabilities and attacks," Journal of Surveillance, Security and Safety, 1.1, 34-60, 2020. |
11 | Chang, Yue Shan, et al., "Big data platform for air quality analysis and prediction," in Proc. of 2018 27th Wireless and Optical Communication Conference (WOCC), IEEE, 2018. |
12 | Mockapetris, Paul, and Kevin J. Dunlap, "Development of the domain name system," ACM SIGCOMM Computer Communication Review, 18.4, 123-133, 1988. DOI |
13 | Park, Kyounghyun, Minh Chau Nguyen, and Heesun Won, "Web-based collaborative big data analytics on big data as a service platform," in Proc. of 2015 17th international conference on advanced communication technology (icact), IEEE, 2015. |
14 | Deng, Zhiliang, et al., "Blockchain-based trusted electronic records preservation in cloud storage," Comput. Mater. Continua, 58.1, 135-151, 2019. DOI |
15 | I. Eyal and E. G. Sirer, "Majority is not enough: Bitcoin mining is vulnerable," CoRR, abs/1311.0243, 2013. |
16 | Grundy, Quinn, et al., "Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis," bmj, 364, 2019. |
17 | Heydon, Allan, and Marc Najork, "Mercator: A scalable, extensible web crawler," World Wide Web, 2.4, 219-229, 1999. DOI |
18 | Qin, X., Huang, Y. & Li, X, "An ECC-based access control scheme with lightweight decryption and conditional authentication for data sharing in vehicular networks," Soft Computing, 24, 18881-18891, 2020. DOI |
19 | Yang, Zhen, et al., "Protecting personal sensitive data security in the cloud with blockchain," Advances in Computers, 120, 195-231, 2021. DOI |
20 | X. Qin, Y. Huang, Z. Yang and X. Li, "An access control scheme with fine-grained time constrained attributes based on smart contract and trapdoor," in Proc. of 2019 26th International Conference on Telecommunications (ICT), Hanoi, Vietnam, pp. 249-253, 2019. |
21 | Li, Jun, et al., "A distributed privacy preservation approach for big data in public health emergencies using smart contract and SGX," CMC-COMPUTERS MATERIALS & CONTINUA, 65.1, 723-741, 2020. DOI |
22 | Pundt, Hardy, and Yaser Bishr, "Domain ontologies for data sharing-an example from environmental monitoring using field GIS," Computers & Geosciences, 28.1, 95-102, 2002. DOI |
23 | Bordel, Borja, et al., "Trust provision in the internet of things using transversal blockchain networks," INTELLIGENT AUTOMATION AND SOFT COMPUTING, 25.1, 155-170, 2019. |
24 | King, Gary, "An introduction to the dataverse network as an infrastructure for data sharing," Sociological Methods & Research, 36.2, 173-199, 2007. DOI |
25 | Xu, Xiwei, et al., "A taxonomy of blockchain-based systems for architecture design," in Proc. of 2017 IEEE international conference on software architecture (ICSA), IEEE, 2017. |
26 | Qian, Xin, et al., "A No-Pairing Proxy Re-Encryption Scheme for Data Sharing in Untrusted Cloud," in Proc. of International Conference on Artificial Intelligence and Security, Springer, Cham, pp. 85-96, 2019. |
27 | Qin, Xuanmei, et al., "A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing," Journal of Systems Architecture, 112, 101854, 2020. DOI |
28 | Qin, Xuanmei, et al., "LBAC: A Lightweight Blockchain-based Access Control Scheme for the Internet of Things," Information Sciences, 554, 222-235, 2021. DOI |
29 | Le Nguyen, Bao, et al., "Privacy preserving blockchain technique to achieve secure and reliable sharing of IoT data," CMC-COMPUTERS MATERIALS & CONTINUA, 65.1, 87-107, 2020. DOI |
30 | Yang, Zhen, et al., "Efficient secure data provenance scheme in multimedia outsourcing and sharing," Computers, Materials & Continua, 56.1, 1-17, 2018. |
31 | Lopez, Vanessa, et al., "Queriocity: A linked data platform for urban information management," in Proc. of International Semantic Web Conference, Springer, Berlin, Heidelberg, pp. 148-163, 2012. |
32 | Namecoin. |
33 | H. Kalodner, M. Carlsten, P. Ellenbogen, J. Bonneau, A. Narayanan, "An empirical study of Namecoin and lessons for decentralized namespace design," in Proc. of the 14th Workshop on the Economics of Information Security, pp. 1-21, June 22-23, 2015. |
34 | Muneeb Ali, Jude Nelson, Ryan Shea, Michael J. Freedman, "Blockstack: A Global Naming and Storage System Secured by Blockchains," in Proc. of 2016 USENIX Annual Technical Conference, pp. 181-194, June 22-24, 2016. |
35 | Keybase. |