
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Lightweight Cloud Storage Auditing With Deduplication Supporting Strong Privacy Protection
Wenting Shen, Ye Su, Rong Hao
IEEE Access (2020) Vol. 8, pp. 44359-44372
Open Access | Times Cited: 31
Wenting Shen, Ye Su, Rong Hao
IEEE Access (2020) Vol. 8, pp. 44359-44372
Open Access | Times Cited: 31
Showing 1-25 of 31 citing articles:
A Review on Secure Data Deduplication: Cloud Storage Security Issue
Priteshkumar Prajapati, Parth Shah
Journal of King Saud University - Computer and Information Sciences (2020) Vol. 34, Iss. 7, pp. 3996-4007
Open Access | Times Cited: 69
Priteshkumar Prajapati, Parth Shah
Journal of King Saud University - Computer and Information Sciences (2020) Vol. 34, Iss. 7, pp. 3996-4007
Open Access | Times Cited: 69
Secure biometric authentication with de-duplication on distributed cloud storage
M. Vinoth Kumar, K. Venkatachalam, P. Prabu, et al.
PeerJ Computer Science (2021) Vol. 7, pp. e569-e569
Open Access | Times Cited: 57
M. Vinoth Kumar, K. Venkatachalam, P. Prabu, et al.
PeerJ Computer Science (2021) Vol. 7, pp. e569-e569
Open Access | Times Cited: 57
Efficient Integrity Auditing Mechanism With Secure Deduplication for Blockchain Storage
Qingyang Zhang, Dongfang Sui, Jie Cui, et al.
IEEE Transactions on Computers (2023) Vol. 72, Iss. 8, pp. 2365-2376
Closed Access | Times Cited: 17
Qingyang Zhang, Dongfang Sui, Jie Cui, et al.
IEEE Transactions on Computers (2023) Vol. 72, Iss. 8, pp. 2365-2376
Closed Access | Times Cited: 17
Secure auditing and deduplication with efficient ownership management for cloud storage
Min Wang, Lu-Jun Xu, Rong Hao, et al.
Journal of Systems Architecture (2023) Vol. 142, pp. 102953-102953
Closed Access | Times Cited: 14
Min Wang, Lu-Jun Xu, Rong Hao, et al.
Journal of Systems Architecture (2023) Vol. 142, pp. 102953-102953
Closed Access | Times Cited: 14
An efficient and secure data sharing scheme for mobile devices in cloud computing
Xiuqing Lu, Zhenkuan Pan, Hequn Xian
Journal of Cloud Computing Advances Systems and Applications (2020) Vol. 9, Iss. 1
Open Access | Times Cited: 35
Xiuqing Lu, Zhenkuan Pan, Hequn Xian
Journal of Cloud Computing Advances Systems and Applications (2020) Vol. 9, Iss. 1
Open Access | Times Cited: 35
Cloud storage auditing and data sharing with data deduplication and private information protection for cloud-based EMR
Jingze Yu, Wenting Shen, Xi Zhang
Computers & Security (2024) Vol. 144, pp. 103932-103932
Closed Access | Times Cited: 3
Jingze Yu, Wenting Shen, Xi Zhang
Computers & Security (2024) Vol. 144, pp. 103932-103932
Closed Access | Times Cited: 3
VeriDedup: A Verifiable Cloud Data Deduplication Scheme With Integrity and Duplication Proof
Xixun Yu, Hui Bai, Zheng Yan, et al.
IEEE Transactions on Dependable and Secure Computing (2022) Vol. 20, Iss. 1, pp. 680-694
Open Access | Times Cited: 13
Xixun Yu, Hui Bai, Zheng Yan, et al.
IEEE Transactions on Dependable and Secure Computing (2022) Vol. 20, Iss. 1, pp. 680-694
Open Access | Times Cited: 13
A verifiable data integrity scheme for distributed data sharing in fog computing architecture
Youssef Sellami, Youcef Imine, Antoine Gallais
Future Generation Computer Systems (2023) Vol. 150, pp. 64-77
Closed Access | Times Cited: 7
Youssef Sellami, Youcef Imine, Antoine Gallais
Future Generation Computer Systems (2023) Vol. 150, pp. 64-77
Closed Access | Times Cited: 7
Redundancy elimination in IoT oriented big data: a survey, schemes, open challenges and future applications
Ridhima Rani, Neeraj Kumar, Meenu Khurana
Cluster Computing (2024) Vol. 27, Iss. 1, pp. 1063-1087
Closed Access | Times Cited: 2
Ridhima Rani, Neeraj Kumar, Meenu Khurana
Cluster Computing (2024) Vol. 27, Iss. 1, pp. 1063-1087
Closed Access | Times Cited: 2
Convergent encryption enabled secure data deduplication algorithm for cloud environment
Shahnawaz Ahmad, Mohd. Arif, Javed Ahmad, et al.
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 21
Open Access | Times Cited: 2
Shahnawaz Ahmad, Mohd. Arif, Javed Ahmad, et al.
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 21
Open Access | Times Cited: 2
An efficient data flow material model based cloud authentication data security and reduce a cloud storage cost using Index-level Boundary Pattern Convergent Encryption algorithm
Vidhyanandhini Krishnasamy, Saravanarajan Venkatachalam
Materials Today Proceedings (2021) Vol. 81, pp. 931-936
Closed Access | Times Cited: 16
Vidhyanandhini Krishnasamy, Saravanarajan Venkatachalam
Materials Today Proceedings (2021) Vol. 81, pp. 931-936
Closed Access | Times Cited: 16
Secure cloud storage auditing with deduplication and efficient data transfer
Jingze Yu, Wenting Shen
Cluster Computing (2023) Vol. 27, Iss. 2, pp. 2203-2215
Closed Access | Times Cited: 6
Jingze Yu, Wenting Shen
Cluster Computing (2023) Vol. 27, Iss. 2, pp. 2203-2215
Closed Access | Times Cited: 6
FogDedupe: A Fog-Centric Deduplication Approach Using Multi-Key Homomorphic Encryption Technique
Mohamed Sirajudeen Yoosuf, C. Muralidharan, Shitharth Selvarajan, et al.
Journal of Sensors (2022) Vol. 2022, pp. 1-16
Open Access | Times Cited: 10
Mohamed Sirajudeen Yoosuf, C. Muralidharan, Shitharth Selvarajan, et al.
Journal of Sensors (2022) Vol. 2022, pp. 1-16
Open Access | Times Cited: 10
Marketing data security and privacy protection based on federated gamma in cloud computing environment
Caixia Zhang, Zijian Pan, Chaofan Hou
International Journal of Intelligent Networks (2023) Vol. 4, pp. 261-271
Open Access | Times Cited: 4
Caixia Zhang, Zijian Pan, Chaofan Hou
International Journal of Intelligent Networks (2023) Vol. 4, pp. 261-271
Open Access | Times Cited: 4
Privacy protection domain-user integra tag deduplication in cloud data server
Mohanaprakash Thottipalayam Andavan, V. Nirmalrani
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2022) Vol. 12, Iss. 4, pp. 4155-4155
Open Access | Times Cited: 5
Mohanaprakash Thottipalayam Andavan, V. Nirmalrani
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2022) Vol. 12, Iss. 4, pp. 4155-4155
Open Access | Times Cited: 5
Decentralized and Privacy Sensitive Data De-Duplication Framework for Convenient Big Data Management in Cloud Backup Systems
J Gnana Jeslin, P. Mohan Kumar
Symmetry (2022) Vol. 14, Iss. 7, pp. 1392-1392
Open Access | Times Cited: 5
J Gnana Jeslin, P. Mohan Kumar
Symmetry (2022) Vol. 14, Iss. 7, pp. 1392-1392
Open Access | Times Cited: 5
A Secure and Efficient Data Deduplication Scheme with Dynamic Ownership Management in Cloud Computing
Xuewei Ma, Wenyuan Yang, Yuesheng Zhu, et al.
(2022), pp. 194-201
Open Access | Times Cited: 4
Xuewei Ma, Wenyuan Yang, Yuesheng Zhu, et al.
(2022), pp. 194-201
Open Access | Times Cited: 4
RETRACTED: Cloud computing based deduplication using high-performance grade byte check and fuzzy search technique
Mohanaprakash Thottipalayam Andavan, V. Nirmalrani
Journal of Intelligent & Fuzzy Systems (2022) Vol. 44, Iss. 2, pp. 3411-3425
Closed Access | Times Cited: 3
Mohanaprakash Thottipalayam Andavan, V. Nirmalrani
Journal of Intelligent & Fuzzy Systems (2022) Vol. 44, Iss. 2, pp. 3411-3425
Closed Access | Times Cited: 3
FAA-Cloud approach to minimize computation overhead using fuzzy-based crypto security
Praneeth Kanagala, Ramkumar Jayaraman
Soft Computing (2023)
Closed Access | Times Cited: 1
Praneeth Kanagala, Ramkumar Jayaraman
Soft Computing (2023)
Closed Access | Times Cited: 1
Low Latency Fog-Centric Deduplication Approach to Reduce IoT Healthcare Data Redundancy
Mohamed Sirajudeen Yoosuf, R. Anitha
Wireless Personal Communications (2022) Vol. 126, Iss. 1, pp. 421-443
Closed Access | Times Cited: 2
Mohamed Sirajudeen Yoosuf, R. Anitha
Wireless Personal Communications (2022) Vol. 126, Iss. 1, pp. 421-443
Closed Access | Times Cited: 2
An Efficient Public Batch Auditing Scheme for Data Integrity in Standard Model
Haining Yang, Ye Su, Jing Qin, et al.
Lecture notes in computer science (2020), pp. 578-592
Closed Access | Times Cited: 2
Haining Yang, Ye Su, Jing Qin, et al.
Lecture notes in computer science (2020), pp. 578-592
Closed Access | Times Cited: 2
Storage Enhancement in the Cloud Using Machine Learning Technique and Novel Hash Algorithm for Cloud Data Security
C.R. Hema, Fausto Pedro Garcı́a Márquez
Lecture notes on data engineering and communications technologies (2022), pp. 516-526
Closed Access | Times Cited: 1
C.R. Hema, Fausto Pedro Garcı́a Márquez
Lecture notes on data engineering and communications technologies (2022), pp. 516-526
Closed Access | Times Cited: 1
Convergent Encryption Enabled Secure Data Deduplication Algorithm for Cloud Environment
Shahnawaz Ahmad, Shabana Mehfuz, Iman Shakeel
Research Square (Research Square) (2022)
Open Access | Times Cited: 1
Shahnawaz Ahmad, Shabana Mehfuz, Iman Shakeel
Research Square (Research Square) (2022)
Open Access | Times Cited: 1
Empirical Analysis of the Impact of Homomorphic Encryption on Cloud Computing
Chinmayee Rout, Srinivas Sethi, Ramesh K. Sahoo, et al.
Lecture notes in electrical engineering (2022), pp. 107-120
Closed Access | Times Cited: 1
Chinmayee Rout, Srinivas Sethi, Ramesh K. Sahoo, et al.
Lecture notes in electrical engineering (2022), pp. 107-120
Closed Access | Times Cited: 1
Issues and Challenges of Classical Cryptography in Cloud Computing
Amrutanshu Panigrahi, Ajit Kumar Nayak, Rourab Paul
(2021), pp. 143-165
Closed Access | Times Cited: 1
Amrutanshu Panigrahi, Ajit Kumar Nayak, Rourab Paul
(2021), pp. 143-165
Closed Access | Times Cited: 1