Cryptographic Cloud Storage with Hadoop Implementation
暂无分享,去创建一个
[1] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[2] Cryptography with constant input locality , 2007, CRYPTO 2007.
[3] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[4] Cong Wang,et al. Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[5] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[6] Yuval Ishai,et al. COMPUTATIONALLY PRIVATE RANDOMIZING POLYNOMIALS AND THEIR APPLICATIONS , 2005, 20th Annual IEEE Conference on Computational Complexity (CCC'05).
[7] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[8] Martín Abadi,et al. On hiding information from an oracle , 1987, STOC '87.
[9] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[10] Michael K. Reiter,et al. Verifying distributed erasure-coded data , 2007, PODC '07.
[11] Leslie G. Valiant,et al. A bridging model for parallel computation , 1990, CACM.
[12] Sergei Vassilvitskii,et al. A model of computation for MapReduce , 2010, SODA '10.
[13] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[14] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[15] Mary Baker,et al. Auditing to Keep Online Storage Services Honest , 2007, HotOS.
[16] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[17] Ying Ding,et al. Note: Correction to the 1997 tutorial on Reed–Solomon coding , 2005, Softw. Pract. Exp..
[18] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[19] Ethan L. Miller,et al. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[20] Yevgeniy Dodis,et al. Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..
[21] B. Applebaum. Cryptography in NC0 , 2014 .
[22] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[23] Michael Burrows,et al. A Cooperative Internet Backup Scheme , 2003, USENIX Annual Technical Conference, General Track.
[24] Frederik Vercauteren,et al. Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.
[25] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.