Auditing Protocols for Cloud Storage: A Survey
暂无分享,去创建一个
Jian Shen | Sai Ji | Zhangjie Fu | Jun Shen | Jin Wang | S. Ji | Zhangjie Fu | Jun Shen | Jian Shen | Jin Wang | Jian Shen
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[3] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.
[4] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[5] Sajjad Haider,et al. Security threats in cloud computing , 2011, 2011 International Conference for Internet Technology and Secured Transactions.
[6] D. Patel,et al. A Review of Approaches to Achieve Data Storage Correctness in Cloud Computing Using Trusted Third Party Auditor , 2012, 2012 International Symposium on Cloud and Services Computing.
[7] Jin Li,et al. Efficient Fair Conditional Payments for Outsourcing Computations , 2012, IEEE Transactions on Information Forensics and Security.
[8] William R. Claycomb,et al. Insider Threats to Cloud Computing: Directions for New Research Challenges , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference.
[9] Li Wang,et al. Research on Pricing Model of Cloud Storage , 2013, 2013 IEEE Ninth World Congress on Services.
[10] Xiaohua Jia,et al. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.
[11] Zoe L. Jiang,et al. Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.
[12] M. Tech,et al. Data Integrity Proofs in Cloud Storage , 2013 .
[13] Yi Mu,et al. Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification , 2015, IEEE Transactions on Information Forensics and Security.
[14] Cong Wang,et al. Enabling Cloud Storage Auditing With Key-Exposure Resistance , 2015, IEEE Transactions on Information Forensics and Security.
[15] Ilsun You,et al. Verifiable Auditing for Outsourced Database in Cloud Computing , 2015, IEEE Transactions on Computers.