Identity‐based storage management and integrity verify protocol for secure outsourcing in multi‐cloud
暂无分享,去创建一个
Xinxin Niu | Licheng Wang | Jinxia Wei | Chenlei Cao | Lingwei Song | Xinxin Niu | Licheng Wang | Jinxia Wei | Lingwei Song | Chenlei Cao
[1] Zoe L. Jiang,et al. Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.
[2] Mary Baker,et al. Auditing to Keep Online Storage Services Honest , 2007, HotOS.
[3] Moni Naor,et al. The complexity of online memory checking , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[4] Yixian Yang,et al. IBC-Based Entity Authentication Protocols for Federated Cloud Systems , 2013, KSII Trans. Internet Inf. Syst..
[5] Sushil Jajodia,et al. Integrity and Internal Control in Information Systems VI , 2013, IFIP International Federation for Information Processing.
[6] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[7] Ethan L. Miller,et al. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[8] Josep Domingo-Ferrer,et al. Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.
[9] Xiaohua Jia,et al. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.
[10] Nenghai Yu,et al. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.
[11] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[12] Toby Velte,et al. Cloud Computing, A Practical Approach , 2009 .
[13] Huaqun Wang,et al. Identity-Based Distributed Provable Data Possession in Multicloud Storage , 2015, IEEE Transactions on Services Computing.
[14] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[15] Frank Dürr,et al. PShare: Ensuring location privacy in non-trusted systems through multi-secret sharing , 2013, Pervasive Mob. Comput..
[16] Michael Burrows,et al. A Cooperative Internet Backup Scheme , 2003, USENIX Annual Technical Conference, General Track.
[17] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[18] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[19] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[20] Gail-Joon Ahn,et al. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.
[21] Paulo S. L. M. Barreto,et al. Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..
[22] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.