Two-Level Verification of Data Integrity for Data Storage in Cloud Computing
暂无分享,去创建一个
Chunlin Chen | Ping Jiang | Guangwei Xu | Mugen Pang | Zhuping Zang | Hongya Wang | Guangwei Xu | Hongya Wang | Zhuping Zang | Chunling Chen | Mugen Pang | Ping Jiang
[1] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[2] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[3] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[4] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[5] Rui Zhang,et al. PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems , 2010, 2010 Proceedings IEEE INFOCOM.
[6] Wenliang Du,et al. Uncheatable grid computing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[7] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .