Protective Auditing and Deduplicating Data in Cloud
暂无分享,去创建一个
B. M. Patil | C Munde Sadashiv | B. Patil | C. M. Sadashiv | Munde Sadashiv | C. P. Student | PG Dept
[1] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[2] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.
[3] Jin Li,et al. An Efficient Proof of Retrievability with Public Auditing in Cloud Computing , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.
[4] Gail-Joon Ahn,et al. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.
[5] Mihir Bellare,et al. DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.
[6] Yonggang Wen,et al. Private data deduplication protocols in cloud storage , 2012, SAC '12.
[7] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[8] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[9] Harikesh Pandey,et al. Secure and Constant Cost Public Cloud Storage Auditing with Deduplication , 2017 .
[10] Benny Pinkas,et al. Proofs of ownership in remote storage systems , 2011, CCS '11.
[11] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[12] Reza Curtmola,et al. Remote data checking using provable data possession , 2011, TSEC.