Assessment of Integrity Auditing Protocols for Outsourced Big Data
暂无分享,去创建一个
[1] Yihua Zhang,et al. Efficient Dynamic Provable Possession of Remote Data via Update Trees , 2016, TOS.
[2] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, ASIACRYPT.
[3] Fatos Xhafa,et al. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices , 2015, IEEE Transactions on Cloud Computing.
[4] B. Padmavathi,et al. Survey of Confidentiality and Integrity in Outsourced Databases , 2013 .
[5] Hong Jiang,et al. Dynamic and Public Auditing with Fair Arbitration for Cloud Data , 2018, IEEE Transactions on Cloud Computing.
[6] Roberto Tamassia,et al. Dynamic provable data possession , 2009, IACR Cryptol. ePrint Arch..
[7] Tao Jiang,et al. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation , 2016, IEEE Transactions on Computers.
[8] Anmin Fu,et al. NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users , 2017, IEEE Transactions on Big Data.
[9] Ajeet Ram Pathak,et al. A secure threshold secret sharing framework for database outsourcing , 2014, 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies.
[10] Ertem Esiner,et al. FlexDPDP , 2016, ACM Trans. Storage.
[11] David Cash,et al. Dynamic Proofs of Retrievability Via Oblivious RAM , 2013, Journal of Cryptology.
[12] Huaqun Wang,et al. Identity-Based Distributed Provable Data Possession in Multicloud Storage , 2015, IEEE Transactions on Services Computing.
[13] Gail-Joon Ahn,et al. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.
[14] Jiankun Hu,et al. Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds , 2017, IEEE Transactions on Information Forensics and Security.
[15] Lei Zhang,et al. Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud , 2016, IEEE Transactions on Information Forensics and Security.
[16] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[17] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.