Data verification using block level batch auditing on multi-cloud server
暂无分享,去创建一个
[1] Tan Shuang,et al. An efficient method for checking the integrity of data in the Cloud , 2014, China Communications.
[2] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[3] R Raghavendran,et al. Security Challenges for Public Cloud , 2015 .
[4] Sanjay Kumar Madria. Security and Risk Assessment in the Cloud , 2016, Computer.
[5] Hui Li,et al. Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud , 2015, IEEE Transactions on Services Computing.
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] Elaine Shi,et al. Cloud Data Protection for the Masses , 2012, Computer.
[8] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[9] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[10] Liu Yang,et al. An Efficient and Secure Public Batch Auditing Protocol for Dynamic Cloud Storage Data , 2016, 2016 International Computer Symposium (ICS).
[11] Xiaohua Jia,et al. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.
[12] Priyanka,et al. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage , 2014 .
[13] Qian Wang,et al. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems , 2018, IEEE Transactions on Services Computing.
[14] Min-Shiang Hwang,et al. A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage , 2016, Int. J. Netw. Secur..
[15] Hao Yan,et al. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.
[16] Ye Tian,et al. Role-based Access Control for Body Area Networks Using Attribute-based Encryption in Cloud Storage , 2017, Int. J. Netw. Secur..
[17] Huaqun Wang,et al. Identity-Based Distributed Provable Data Possession in Multicloud Storage , 2015, IEEE Transactions on Services Computing.
[18] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[19] Fenghua Li,et al. Efficient public verification on the integrity of multi-owner data in the cloud , 2014, Journal of Communications and Networks.
[20] Victor I. Chang,et al. A Secured Access Control Technique for Cloud Computing Environment Using Attribute Based Hierarchical Structure and Token Granting System , 2017, Int. J. Netw. Secur..
[21] Ch.V.V. Narasimha Raju,et al. Cloud Data Protection for Masses , 2015 .
[22] Jiankun Hu,et al. Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds , 2017, IEEE Transactions on Information Forensics and Security.
[23] Lin Tan,et al. An efficient method for checking the integrity of data in the Cloud , 2014 .
[24] Jianhong Zhang,et al. An Oriented-Group Supporting Multi-user Public Auditing for Data Sharing , 2015, 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity).