Efficient and secure auditing scheme for outsourced big data with dynamicity in cloud
暂无分享,去创建一个
[1] Xiaohua Jia,et al. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.
[2] Abejide OluAde-Ibijola. A Simulated Enhancement of Fisher-Yates Algorithm for Shuffling in Virtual Card Games using Domain-specific Data Structures , 2012 .
[3] Lin Guoyuan,et al. A hybrid approach for selection in service community , 2014, China Communications.
[4] Ethan L. Miller,et al. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[5] Jiqiang Liu,et al. Public verifiability for shared data in cloud storage with a defense against collusion attacks , 2016, Science China Information Sciences.
[6] Baochun Li,et al. Oruta: Privacy-Preserving Public Auditingfor Shared Data in the Cloud , 2014, IEEE Trans. Cloud Comput..
[7] P. Varalakshmi,et al. A review on public auditing in cloud environment , 2016, 2016 International Conference on Information Communication and Embedded Systems (ICICES).
[8] Reza Curtmola,et al. Remote data checking using provable data possession , 2011, TSEC.
[9] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[10] Hui Li,et al. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.
[11] M. Anwar Hasan,et al. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems , 2013, IEEE Transactions on Parallel and Distributed Systems.
[12] Zoe L. Jiang,et al. Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.
[13] Lei Zhang,et al. Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud , 2016, IEEE Transactions on Information Forensics and Security.
[14] Wang Dongsheng,et al. Enable data dynamics for algebraic signatures based remote data possession checking in the cloud storage , 2014, China Communications.
[15] Rajkumar Buyya,et al. Dynamic remote data auditing for securing big data storage in cloud computing , 2017, Inf. Sci..
[16] M. Anwar Hasan,et al. On Verifying Dynamic Multiple Data Copies over Cloud Servers , 2011, IACR Cryptol. ePrint Arch..
[17] David Cash,et al. Dynamic Proofs of Retrievability Via Oblivious RAM , 2013, Journal of Cryptology.
[18] Jian Shen,et al. An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.
[19] Abejide Ade-Ibijola. A Simulated Enhancement of Fisher-Yates Algorithm for Shuffling in Virtual Card Games using Domain-Specific Data Structures , 2012 .
[20] Lanxiang Chen,et al. Using algebraic signatures to check data possession in cloud storage , 2013, Future Gener. Comput. Syst..
[21] Yong Yu,et al. Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.
[22] Yong Yu,et al. Remote data possession checking with enhanced security for cloud storage , 2015, Future Gener. Comput. Syst..
[23] Jianhong Zhang,et al. Efficient ID-based public auditing for the outsourced data in cloud storage , 2016, Inf. Sci..
[24] Cees T. A. M. de Laat,et al. Big Security for Big Data: Addressing Security Challenges for the Big Data Infrastructure , 2013, Secure Data Management.
[25] Witold Litwin,et al. Algebraic signatures for scalable distributed data structures , 2004, Proceedings. 20th International Conference on Data Engineering.
[26] Nor Badrul Anuar,et al. Towards Dynamic Remote Data Auditing in Computational Clouds , 2014, TheScientificWorldJournal.
[27] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[28] Li Xu,et al. Data dynamics for remote data possession checking in cloud storage , 2013, Comput. Electr. Eng..
[29] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[30] Huaqun Wang,et al. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud , 2016, IEEE Transactions on Information Forensics and Security.
[31] Roberto Tamassia,et al. Dynamic provable data possession , 2009, IACR Cryptol. ePrint Arch..
[32] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[33] Victor I. Chang,et al. Secure searching on cloud storage enhanced by homomorphic indexing , 2016, Future Gener. Comput. Syst..
[34] Yang Li,et al. Provably secure cloud storage for mobile networks with less computation and smaller overhead , 2017, Science China Information Sciences.
[35] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.