A Metadata Verification Scheme for Data Auditing in Cloud Environment
暂无分享,去创建一个
[1] Pardeep Kumar,et al. Effective Ways of Secure, Private and Trusted Cloud Computing , 2011, ArXiv.
[2] Harit Shah,et al. Security Issues on Cloud Computing , 2013, ArXiv.
[3] Bhavesh N. Gohil,et al. A New Data Integrity Checking Protocol with Public Verifiability in Cloud Storage , 2012, IFIPTM.
[4] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[5] Reza Curtmola,et al. Remote data checking using provable data possession , 2011, TSEC.
[6] Nenghai Yu,et al. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.
[7] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[8] Eunmi Choi,et al. A Taxonomy, Survey, and Issues of Cloud Computing Ecosystems , 2010, Cloud Computing.
[9] Kevin W. Hamlen,et al. Security Issues for Cloud Computing , 2010, Int. J. Inf. Secur. Priv..
[10] George Hadjichristofi,et al. Security and trust in Cloud scenarios , 2011, 2011 1st International Workshop on Securing Services on the Cloud (IWSSC).
[11] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[12] Kevin Curran,et al. Cloud Computing Security , 2011, Int. J. Ambient Comput. Intell..
[13] Bu-Sung Lee,et al. Towards Achieving Accountability, Auditability and Trust in Cloud Computing , 2011, ACC.
[14] Gongde Guo,et al. An Efficient Remote Data Possession Checking in Cloud Storage , 2011 .
[15] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[16] Mark Ryan,et al. Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..
[17] George Pallis,et al. Cloud Computing: The New Frontier of Internet Computing , 2010, IEEE Internet Computing.
[18] Frank Gens,et al. Cloud Computing Benefits, risks and recommendations for information security , 2010 .