OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Secure data deduplication using secret sharing schemes over cloud
Priyanka Singh, Nishant Agarwal, Balasubramanian Raman
Future Generation Computer Systems (2018) Vol. 88, pp. 156-167
Closed Access | Times Cited: 38

Showing 1-25 of 38 citing articles:

Data De-Duplication Scheme in Cloud Storage
Jun Ye, Tae-Hyeong Yi, Ruotong Li
Lecture notes in electrical engineering (2025), pp. 500-509
Closed Access

Intelligent security and optimization in Edge/Fog Computing
Meikang Qiu, Sun‐Yuan Kung, Keke Gai
Future Generation Computer Systems (2020) Vol. 107, pp. 1140-1142
Closed Access | Times Cited: 38

Lightweight Cloud Storage Auditing With Deduplication Supporting Strong Privacy Protection
Wenting Shen, Ye Su, Rong Hao
IEEE Access (2020) Vol. 8, pp. 44359-44372
Open Access | Times Cited: 31

Privacy-preserving human action recognition as a remote cloud service using RGB-D sensors and deep CNN
Amitesh Singh Rajput, Balasubramanian Raman, Javed Imran
Expert Systems with Applications (2020) Vol. 152, pp. 113349-113349
Closed Access | Times Cited: 22

Blockchain-Based Shared Data Integrity Auditing and Deduplication
Ying Miao, Keke Gai, Liehuang Zhu, et al.
IEEE Transactions on Dependable and Secure Computing (2023) Vol. 21, Iss. 4, pp. 3688-3703
Closed Access | Times Cited: 7

Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment
Yuan Gao, Hequn Xian, Aimin Yu
International Journal of Distributed Sensor Networks (2020) Vol. 16, Iss. 3, pp. 155014772091100-155014772091100
Open Access | Times Cited: 16

Collusion resistant secret sharing scheme for secure data storage and processing over cloud
V. S. Lakshmi, Sneha Deepthi, Deepthi P. P
Journal of Information Security and Applications (2021) Vol. 60, pp. 102869-102869
Closed Access | Times Cited: 15

Analysis on data deduplication techniques of storage of big data in cloud
K. Vijayalakshmi, V. Jayalakshmi
2022 6th International Conference on Computing Methodologies and Communication (ICCMC) (2021)
Closed Access | Times Cited: 14

BDKM: A Blockchain-Based Secure Deduplication Scheme with Reliable Key Management
Guipeng Zhang, Haoran Xie, Zhenguo Yang, et al.
Neural Processing Letters (2021) Vol. 54, Iss. 4, pp. 2657-2674
Closed Access | Times Cited: 12

Separable reversible data hiding in homomorphic encrypted domain using POB number system
Hua Ren, Shaozhang Niu
Multimedia Tools and Applications (2021) Vol. 81, Iss. 2, pp. 2161-2187
Closed Access | Times Cited: 12

FASTEN: Towards a FAult-Tolerant and STorage EfficieNt Cloud: Balancing Between Replication and Deduplication
Sabbir Ahmed, Md. Nahiduzzaman, Tariqul Islam, et al.
(2024), pp. 44-50
Open Access | Times Cited: 1

Reversible Data Hiding in Encrypted Images Using POB Number System
Hua Ren, Shaozhang Niu, Xinyi Wang
IEEE Access (2019) Vol. 7, pp. 149527-149541
Open Access | Times Cited: 12

Secure Client-Side Deduplication Scheme for Cloud with Dual Trusted Execution Environment
Garima Verma
IETE Journal of Research (2022) Vol. 69, Iss. 10, pp. 7015-7025
Closed Access | Times Cited: 7

An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment
Silambarasan Elkana Ebinazer, S. Nickolas, Mary Saira Bhanu S
Peer-to-Peer Networking and Applications (2020) Vol. 14, Iss. 4, pp. 2443-2451
Closed Access | Times Cited: 9

DropStore: A Secure Backup System Using Multi-Cloud and Fog Computing
Reda Maher, Omar A. Nasr
IEEE Access (2021) Vol. 9, pp. 71318-71327
Open Access | Times Cited: 9

‏An Enhanced Approach to Improve the Security and Performance for Deduplication
Nourah Almrezeq Et al.
Türk bilgisayar ve matematik eğitimi dergisi (2021) Vol. 12, Iss. 6, pp. 2866-2882
Open Access | Times Cited: 8

An approach to remove duplication records in healthcare dataset based on Mimic Deep Neural Network (MDNN) and Chaotic Whale Optimization (CWO)
M. D. Anto Praveena, B. Bharathi
Concurrent Engineering (2021) Vol. 29, Iss. 1, pp. 58-67
Closed Access | Times Cited: 7

A Lossless Polynomial-Based Secret Image Sharing Scheme Utilizing the Filtering Operation
Lintao Liu, Yuliang Lu, Xuehu Yan, et al.
Advances in intelligent systems and computing (2019), pp. 129-139
Closed Access | Times Cited: 6

Practical Use of Secret Sharing for Enhancing Privacy in Clouds
Peter Čuřík, Roderik Ploszek, Pavol Zajac
Electronics (2022) Vol. 11, Iss. 17, pp. 2758-2758
Open Access | Times Cited: 4

Blockchain-Based Decentralized Cloud Storage With Reliable Deduplication and Storage Balancing
Jingyi Li, Yidong Li, Jigang Wu, et al.
IEEE Transactions on Network Science and Engineering (2024) Vol. 11, Iss. 4, pp. 3289-3304
Closed Access

A Secure File Sharing and Audit Trail Tracking Platform with Advanced Encryption Standard for Cloud-Based Environments
M. Jagadeeswari, P. Naveen Karthi, V. A. Nitish Kumar, et al.
(2023), pp. 540-547
Closed Access | Times Cited: 1

An Efficient Method for Realizing Contractions of Access Structures in Cloud Storage
Shuai Feng, Liang Feng Zhang
IEEE Transactions on Services Computing (2023) Vol. 16, Iss. 6, pp. 4481-4492
Open Access | Times Cited: 1

Role-based Access and Advanced Encryption Techniques Ensure Cloud Data Security in Data Deduplication Schemes
P. Swathika, J. Raja Sekar
(2023), pp. 225-232
Closed Access | Times Cited: 1

DROPSTORE - A SECURE BACKUP SYSTEM USING MULTI CLOUD AND FOG COMPUTING
Sri Sarada
Journal of Science and Technology (2023) Vol. 8, Iss. 4, pp. 80-86
Open Access | Times Cited: 1

Deduplication in Cloud Storage
Sanjay Kumar Tyagi
International Journal of Innovative Technology and Exploring Engineering (2019) Vol. 9, Iss. 2S, pp. 364-368
Open Access | Times Cited: 2

Page 1 - Next Page

Scroll to top