Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage
暂无分享,去创建一个
Jia Yu | Hanlin Zhang | Rong Hao | Yan Xu | Huiying Hou
[1] Shouhuai Xu,et al. Secure and efficient proof of storage with deduplication , 2012, CODASPY '12.
[2] Huaqun Wang,et al. Identity-Based Distributed Provable Data Possession in Multicloud Storage , 2015, IEEE Transactions on Services Computing.
[3] Jia Yu,et al. Strong Key-Exposure Resilient Auditing for Secure Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.
[4] Roberto Di Pietro,et al. Boosting efficiency and security in proof of ownership for deduplication , 2012, ASIACCS '12.
[5] Wenting Shen,et al. Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability , 2016, J. Syst. Softw..
[6] Karen S. Phillips,et al. Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates , 2018 .
[7] M. Phil,et al. PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .
[8] Huaqun Wang,et al. Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession , 2019, IEEE Transactions on Services Computing.
[9] Mihir Bellare,et al. On Defining Proofs of Knowledge , 1992, CRYPTO.
[10] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[11] Jinjun Chen,et al. Public Auditing for Big Data Storage in Cloud Computing -- A Survey , 2013, 2013 IEEE 16th International Conference on Computational Science and Engineering.
[12] Shucheng Yu,et al. Secure and constant cost public cloud storage auditing with deduplication , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[13] Salve Bhagyashri Salve Bhagyashri,et al. Privacy-Preserving Public Auditing For Secure Cloud Storage , 2014 .
[14] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[15] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[16] Mayank Aggarwal,et al. File-Specific Deduplication for Cloud Storages , 2017 .
[17] Cong Wang,et al. Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data , 2020, IEEE Transactions on Dependable and Secure Computing.
[18] G. Kalpana,et al. Secure Auditing and Deduplicating Data in Cloud , 2016 .
[19] V. Goutham,et al. Enabling Cloud Storage Auditing with Key Exposure Resistance , 2016 .
[20] Wenting Shen,et al. Remote data possession checking with privacy-preserving authenticators for cloud storage , 2017, Future Gener. Comput. Syst..
[21] Benny Pinkas,et al. Proofs of ownership in remote storage systems , 2011, CCS '11.
[22] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[23] Hanlin Zhang,et al. Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction , 2018, Inf. Sci..
[24] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[25] Shucheng Yu,et al. Efficient public integrity checking for cloud data sharing with multi-user modification , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[26] Wenting Shen,et al. Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium , 2017, J. Netw. Comput. Appl..