Security Analysis and Improvement of a Dynamic-Hash-Table Based Auditing Scheme for Cloud Storage
暂无分享,去创建一个
Yujie Geng | Ti Guan | Jing Wang | Qiang Ma | Min Luo | Yujie Geng | Ma Qiang | Guan Ti | Jing Wang | Luo Min
[1] Yong Yu,et al. Privacy preserving cloud data auditing with efficient key update , 2018, Future Gener. Comput. Syst..
[2] Hongwei Li,et al. CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors , 2019, IEEE Transactions on Cloud Computing.
[3] Chin-Chen Chang,et al. Privacy-preserving public auditing for secure data storage in fog-to-cloud computing , 2019, J. Netw. Comput. Appl..
[4] Yong Wang,et al. Provable multiple replication data possession with full dynamics for secure cloud storage , 2016, Concurr. Comput. Pract. Exp..
[5] Joseph K. Liu,et al. Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services , 2016, IEEE Transactions on Information Forensics and Security.
[6] M. Anwar Hasan,et al. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems , 2015, IEEE Transactions on Information Forensics and Security.
[7] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[8] Cong Wang,et al. Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.
[9] Jing Wang,et al. Secure public data auditing scheme for cloud storage in smart city , 2017, Personal and Ubiquitous Computing.
[10] Yong Yu,et al. Remote data possession checking with enhanced security for cloud storage , 2015, Future Gener. Comput. Syst..
[11] Kim-Kwang Raymond Choo,et al. A secure and efficient public auditing scheme using RSA algorithm for cloud storage , 2017, The Journal of Supercomputing.
[12] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[13] Sherali Zeadally,et al. Privacy-preserving auditing scheme for shared data in public clouds , 2018, The Journal of Supercomputing.
[14] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[15] Stephen S. Yau,et al. Dynamic Audit Services for Outsourced Storages in Clouds , 2013, IEEE Transactions on Services Computing.
[16] Cong Wang,et al. Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[17] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, ASIACRYPT.
[18] Yi Mu,et al. Proof of retrievability with public verifiability resilient against related-key attacks , 2015, IET Inf. Secur..
[19] Yongfeng Huang,et al. Privacy‐Preserving Public Auditing Scheme for Data Confidentiality and Accountability in Cloud Storage , 2019, Chinese Journal of Electronics.
[20] Jin Liu,et al. Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage , 2017, IEEE Transactions on Services Computing.
[21] Xuefeng Zheng,et al. Privacy-preserving TPA Auditing Scheme Based on Skip List for Cloud Storage , 2019, Int. J. Netw. Secur..