Class information for:
Level 1: CLOUD STORAGE//PROVABLE DATA POSSESSION//PUBLIC AUDITING

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
18526 548 31.4 36%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
295 3       CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY 41419
632 2             AUTHENTICATION//CRYPTOGRAPHY//DIGITAL SIGNATURE 13771
18526 1                   CLOUD STORAGE//PROVABLE DATA POSSESSION//PUBLIC AUDITING 548

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 CLOUD STORAGE authKW 1037151 11% 32% 59
2 PROVABLE DATA POSSESSION authKW 1013093 4% 91% 20
3 PUBLIC AUDITING authKW 617208 2% 92% 12
4 DEDUPLICATION authKW 573096 4% 43% 24
5 CLOUD SECURITY authKW 464949 4% 38% 22
6 PROOF OF OWNERSHIP authKW 410301 2% 82% 9
7 CLOUD COMPUTING authKW 404115 26% 5% 145
8 SECURE OUTSOURCING authKW 324187 1% 73% 8
9 PROOF OF RETRIEVABILITY authKW 303363 1% 78% 7
10 STORAGE SECURITY authKW 282076 2% 56% 9

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Information Systems 19594 49% 0% 268
2 Computer Science, Theory & Methods 7308 32% 0% 175
3 Computer Science, Software Engineering 6606 26% 0% 140
4 Computer Science, Hardware & Architecture 6514 20% 0% 107
5 Telecommunications 4782 25% 0% 137
6 Engineering, Electrical & Electronic 997 26% 0% 145
7 Computer Science, Artificial Intelligence 309 7% 0% 37
8 Computer Science, Interdisciplinary Applications 152 5% 0% 28
9 Medical Informatics 12 1% 0% 4
10 Engineering, General 3 1% 0% 6

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 SOCIAL SECUR IT MANAGEMENT 111441 0% 100% 2
2 BEIJING INTERNET SECUR TECHNOL 99054 1% 44% 4
3 JIANGSU ENGN NETWORK MONITORING 95822 3% 10% 17
4 HIGH ASSURANCE SOFTWARE HAS 74292 0% 67% 2
5 IT AUDITING UNIT 74292 0% 67% 2
6 STATE INTEGRATED SERV NETWORKS ISN 69421 2% 14% 9
7 BIG DATA TECHNOL SMART CITY 55720 0% 100% 1
8 BJUT INFORMAT TECHNOL 55720 0% 100% 1
9 CERIAS EDUC INFORMAT ASSURANCE SECUR 55720 0% 100% 1
10 CHAIR BUSINESS INFORMAT ESP SOCIAL MEDIA DATA S 55720 0% 100% 1

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 ACM TRANSACTIONS ON STORAGE 50637 2% 9% 10
2 JOURNAL OF INTERNET TECHNOLOGY 40803 5% 3% 26
3 SECURITY AND COMMUNICATION NETWORKS 17713 4% 2% 21
4 IEEE TRANSACTIONS ON SERVICES COMPUTING 12696 2% 3% 9
5 IEEE SECURITY & PRIVACY 10646 2% 2% 11
6 CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 9721 2% 2% 11
7 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 8950 4% 1% 24
8 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 8856 3% 1% 15
9 JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 8136 1% 2% 7
10 CHINA COMMUNICATIONS 7525 3% 1% 14

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 CLOUD STORAGE 1037151 11% 32% 59 Search CLOUD+STORAGE Search CLOUD+STORAGE
2 PROVABLE DATA POSSESSION 1013093 4% 91% 20 Search PROVABLE+DATA+POSSESSION Search PROVABLE+DATA+POSSESSION
3 PUBLIC AUDITING 617208 2% 92% 12 Search PUBLIC+AUDITING Search PUBLIC+AUDITING
4 DEDUPLICATION 573096 4% 43% 24 Search DEDUPLICATION Search DEDUPLICATION
5 CLOUD SECURITY 464949 4% 38% 22 Search CLOUD+SECURITY Search CLOUD+SECURITY
6 PROOF OF OWNERSHIP 410301 2% 82% 9 Search PROOF+OF+OWNERSHIP Search PROOF+OF+OWNERSHIP
7 CLOUD COMPUTING 404115 26% 5% 145 Search CLOUD+COMPUTING Search CLOUD+COMPUTING
8 SECURE OUTSOURCING 324187 1% 73% 8 Search SECURE+OUTSOURCING Search SECURE+OUTSOURCING
9 PROOF OF RETRIEVABILITY 303363 1% 78% 7 Search PROOF+OF+RETRIEVABILITY Search PROOF+OF+RETRIEVABILITY
10 STORAGE SECURITY 282076 2% 56% 9 Search STORAGE+SECURITY Search STORAGE+SECURITY

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 ABO-ALIAN, A , BADR, NL , TOLBA, MF , (2017) INTEGRITY AS A SERVICE FOR REPLICATED DATA ON THE CLOUD.CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE. VOL. 29. ISSUE 4. P. - 21 88% 0
2 SOOKHAK, M , GANI, A , KHAN, MK , BUYYA, R , (2017) DYNAMIC REMOTE DATA AUDITING FOR SECURING BIG DATA STORAGE IN CLOUD COMPUTING.INFORMATION SCIENCES. VOL. 380. ISSUE . P. 101 -116 13 42% 4
3 GARG, N , BAWA, S , (2016) COMPARATIVE ANALYSIS OF CLOUD DATA INTEGRITY AUDITING PROTOCOLS.JOURNAL OF NETWORK AND COMPUTER APPLICATIONS. VOL. 66. ISSUE . P. 17 -32 16 94% 0
4 YAN, H , LI, JG , HAN, JG , ZHANG, YC , (2017) A NOVEL EFFICIENT REMOTE DATA POSSESSION CHECKING PROTOCOL IN CLOUD STORAGE.IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. VOL. 12. ISSUE 1. P. 78 -88 16 80% 0
5 HE, DB , WANG, HQ , ZHANG, JH , WANG, LN , (2017) INSECURITY OF AN IDENTITY-BASED PUBLIC AUDITING PROTOCOL FOR THE OUTSOURCED DATA IN CLOUD STORAGE.INFORMATION SCIENCES. VOL. 375. ISSUE . P. 48 -53 14 88% 0
6 ALI, M , KHAN, SU , VASILAKOS, AV , (2015) SECURITY IN CLOUD COMPUTING: OPPORTUNITIES AND CHALLENGES.INFORMATION SCIENCES. VOL. 305. ISSUE . P. 357 -383 18 39% 51
7 YU, J , REN, K , WANG, C , (2016) ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES.IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. VOL. 11. ISSUE 6. P. 1362 -1375 14 82% 0
8 ZHANG, JH , DONG, QC , (2016) EFFICIENT ID-BASED PUBLIC AUDITING FOR THE OUTSOURCED DATA IN CLOUD STORAGE.INFORMATION SCIENCES. VOL. 343. ISSUE . P. 1 -14 13 72% 3
9 YU, Y , XUE, L , AU, MH , SUSILO, W , NI, JB , ZHANG, YF , VASILAKOS, AV , SHEN, J , (2016) CLOUD DATA INTEGRITY CHECKING WITH AN IDENTITY-BASED AUDITING MECHANISM FROM RSA.FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE. VOL. 62. ISSUE . P. 85 -91 9 90% 4
10 WANG, HQ , HE, DB , TANG, SH , (2016) IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD.IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. VOL. 11. ISSUE 6. P. 1165 -1176 11 73% 4

Classes with closest relation at Level 1



Rank Class id link
1 36382 BARRY BOEHM//SMART UNIVERSITY//ACCREDITATION COMPETENCIES
2 28772 AUTHENTICATED DATA STRUCTURES//CERTIFICATE REVOCATION//CHAIR MOBILE COMMERCE MULTILATERAL SECUR
3 414 DIGITAL SIGNATURE//BILINEAR PAIRING//PROXY SIGNATURE
4 2697 CLOUD COMPUTING//MOBILE CLOUD COMPUTING//VIRTUALIZATION
5 36973 IT SECURITY DEVELOPMENT//E ENABLED AIRCRAFT//REGRESSION BENCHMARKING
6 23300 RETURN ORIENTED PROGRAMMING//DEVICE DRIVERS//HYPERVISORS
7 28047 HIMALIS//FUTURE NETWORK//NEW GENERATION NETWORK
8 15336 MAPREDUCE//HADOOP//DATA INTENSIVE COMPUTING
9 37532 DENIABLE AUTHENTICATION//DENIABLE AUTHENTICATION PROTOCOL//E MAIL PROTOCOL
10 30058 USER BEHAVIOR SIMILARITY//LOCATION PROXIMITY//WEB BASED SOCIAL NETWORKS

Go to start page