Certificateless Provable Group Shared Data Possession with Comprehensive Privacy Preservation for Cloud Storage
暂无分享,去创建一个
Zhou Lei | Wenfeng Shen | Hongbin Yang | Shuxiong Jiang | Zhou Lei | Wenfeng Shen | Hongbin Yang | Shuxiong Jiang
[1] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[2] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[3] David Cooper,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.
[4] M. Phil,et al. PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .
[5] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[6] Xiaohua Jia,et al. Data storage auditing service in cloud computing: challenges, methods and opportunities , 2011, World Wide Web.
[7] R. A. Rueppel,et al. Message recovery for signature schemes based on the discrete logarithm problem , 1994, EUROCRYPT.
[8] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[9] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[10] Fenghua Li,et al. Certificateless public auditing for data integrity in the cloud , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[11] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[12] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[13] Robert H. Deng,et al. Variations of Diffie-Hellman Problem , 2003, ICICS.
[14] Joseph K. Liu,et al. Security Concerns in Popular Cloud Storage Services , 2013, IEEE Pervasive Computing.
[15] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[16] Jinjun Chen,et al. MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud , 2015, IEEE Transactions on Computers.
[17] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[18] Huaqun Wang,et al. Proxy Provable Data Possession in Public Clouds , 2013, IEEE Transactions on Services Computing.
[19] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[20] David Cash,et al. Dynamic Proofs of Retrievability Via Oblivious RAM , 2013, Journal of Cryptology.
[21] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[22] Krishna P. Gummadi,et al. Towards Trusted Cloud Computing , 2009, HotCloud.
[23] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[24] Yi Mu,et al. Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage , 2014, International Journal of Information Security.
[25] Nicolae Paladi,et al. Providing User Security Guarantees in Public Infrastructure Clouds , 2017, IEEE Transactions on Cloud Computing.
[26] Huaqun Wang,et al. Identity-Based Distributed Provable Data Possession in Multicloud Storage , 2015, IEEE Transactions on Services Computing.
[27] Jiguo Li,et al. Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage , 2018, IEEE Transactions on Services Computing.
[28] Salve Bhagyashri Salve Bhagyashri,et al. Privacy-Preserving Public Auditing For Secure Cloud Storage , 2014 .
[29] Josep Domingo-Ferrer,et al. Identity-based remote data possession checking in public clouds , 2014, IET Inf. Secur..
[30] Yong Yu,et al. Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.
[31] Nicolae Paladi,et al. Security aspects of e-Health systems migration to the cloud , 2014, 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom).
[32] Shucheng Yu,et al. Proofs of retrievability with public verifiability and constant communication cost in cloud , 2013, Cloud Computing '13.
[33] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[34] Jianhong Zhang,et al. Efficient ID-based public auditing for the outsourced data in cloud storage , 2016, Inf. Sci..