A Review of Approaches to Achieve Data Storage Correctness in Cloud Computing Using Trusted Third Party Auditor
暂无分享,去创建一个
[1] T. Grance,et al. SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing , 2011 .
[2] R. Subramanian,et al. Ensuring data storage security in cloud computing using Sobol Sequence , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).
[3] Cong Wang,et al. Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.
[4] Ge Cheng,et al. Sealed storage for trusted cloud computing , 2010, 2010 International Conference On Computer Design and Applications.
[5] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[6] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[7] Ayman I. Kayssi,et al. Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[8] Siani Pearson,et al. A Privacy Manager for Cloud Computing , 2009, CloudCom.
[9] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[10] Junfeng Tian,et al. A Trusted Control Model of Cloud Storage , 2012, 2012 International Conference on Computer Distributed Control and Intelligent Environmental Monitoring.
[11] Athanasios V. Vasilakos,et al. SecCloud: Bridging Secure Storage and Computation in Cloud , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.
[12] Stephen S. Yau,et al. Efficient audit service outsourcing for data integrity in clouds , 2012, J. Syst. Softw..
[13] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[14] Subhash Chand Gupta,et al. ENSURING DATA INTEGRITY IN CLOUD DATA STORAGE , 2014 .
[15] M. Roberts Masillamani,et al. Design and auditing of Cloud computing security , 2010, 2010 Fifth International Conference on Information and Automation for Sustainability.
[16] Shuai Han,et al. Ensuring data storage security through a novel third party auditor scheme in cloud computing , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.
[17] Mary Baker,et al. Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..
[18] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[19] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.
[20] Dimitris Gritzalis,et al. Secure Cloud Storage: Available Infrastructures and Architectures Review and Evaluation , 2011, TrustBus.
[21] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[22] C Praveen Ram,et al. Security as a Service (SasS): Securing user data by coprocessor and distributing the data , 2010, Trendz in Information Sciences & Computing(TISC2010).