Ensuring data storage security in Cloud Computing
暂无分享,去创建一个
[1] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[2] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[3] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[4] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[5] Michael K. Reiter,et al. Space-Efficient Block Storage Integrity , 2005, NDSS.
[6] Ari Juels,et al. Proofs of retrievability: theory and implementation , 2009, CCSW '09.
[7] John W. Rittinghouse,et al. Cloud Computing: Implementation, Management, and Security , 2009 .
[8] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[9] Reza Curtmola,et al. MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[10] Mary Baker,et al. Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..
[11] Prashant Srivastava,et al. An architecture based on proactive model for security in cloud computing , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[12] Cong Wang,et al. Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.
[13] Wenjing Lou,et al. Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, IEEE INFOCOM 2009.
[14] Aarthi,et al. Towards Secure and Dependable Storage Services in Cloud Computing , 2014 .
[15] Michael Burrows,et al. A Cooperative Internet Backup Scheme , 2003, USENIX Annual Technical Conference, General Track.
[16] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[17] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[18] Ethan L. Miller,et al. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[19] Jia Xu,et al. Remote Integrity Check with Dishonest Storage Server , 2008, ESORICS.
[20] Moni Naor,et al. The Complexity of Online Memory Checking , 2005, FOCS.
[21] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[22] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[23] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.
[24] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[25] Paulo S. L. M. Barreto,et al. Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..
[26] Mary Baker,et al. Auditing to Keep Online Storage Services Honest , 2007, HotOS.