2018
DOI: 10.1049/cje.2017.10.008
|View full text |Cite
|
Sign up to set email alerts
|

A High‐Performance Hierarchical Snapshot Scheme for Hybrid Storage Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…Blind signature can protect user's anonymous instead of encrypting all the data and searching on the ciphertexts. [18][19][20] In addition, researchers proposed some methods to protect security in previous works, [21][22][23][24] which can provide us with new methods to make blind signature scheme in practice. Yun Wang et al proposed a privacy-preserving framework for signature-based intrusion detection in a distributed network based on fog devices.…”
Section: Existing Research Work and Their Shortcomingsmentioning
confidence: 99%
“…Blind signature can protect user's anonymous instead of encrypting all the data and searching on the ciphertexts. [18][19][20] In addition, researchers proposed some methods to protect security in previous works, [21][22][23][24] which can provide us with new methods to make blind signature scheme in practice. Yun Wang et al proposed a privacy-preserving framework for signature-based intrusion detection in a distributed network based on fog devices.…”
Section: Existing Research Work and Their Shortcomingsmentioning
confidence: 99%
“…Compared with traditional data protection technology, CDP has many characteristics and advantages [7]. CDP can provide unlimited RPOs and almost zero RTOs.…”
Section: Related Researchmentioning
confidence: 99%
“…In e-payment and e-voting systems, BS scheme plays an important role for that BS scheme can protect user’s anonymous instead of encrypting all the data and searching on the ciphertexts [ 19 , 20 , 21 ]. In addition, scholars proposed some methods to protect security in the cloud [ 22 , 23 , 24 , 25 ], which can provide us with new methods to make our scheme in practice. Meanwhile, scholars proposed some methods to detect complex event analysis, which can be used to improve the security of these services and applications in the cloud [ 26 , 27 ].…”
Section: Preliminariesmentioning
confidence: 99%