ELAR: extremely lightweight auditing and repairing for cloud security
暂无分享,去创建一个
[1] Reza Curtmola,et al. MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[2] Athina Markopoulou,et al. On detecting pollution attacks in inter-session network coding , 2011, 2012 Proceedings IEEE INFOCOM.
[3] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[4] T. Ho,et al. On Linear Network Coding , 2010 .
[5] Dan Boneh,et al. Homomorphic MACs: MAC-Based Integrity for Network Coding , 2009, ACNS.
[6] Xiaohua Jia,et al. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.
[7] Huajing Fang,et al. Short signature scheme for multi-source network coding , 2012, Comput. Commun..
[8] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[9] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[10] Tran Thao Phuong,et al. MD-POR: Multisource and Direct Repair for Network Coding-Based Proof of Retrievability , 2015, Int. J. Distributed Sens. Networks.
[11] Athina Markopoulou,et al. NC-Audit: Auditing for network coding storage , 2012, 2012 International Symposium on Network Coding (NetCod).
[12] Hui Li,et al. Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud , 2012, ACNS.
[13] Shouhuai Xu,et al. Fair and dynamic proofs of retrievability , 2011, CODASPY '11.
[14] Muriel Médard,et al. An algebraic approach to network coding , 2003, TNET.
[15] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[16] Yevgeniy Dodis,et al. Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..
[17] Alexandros G. Dimakis,et al. Network Coding for Distributed Storage Systems , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[18] Reza Curtmola,et al. Towards self-repairing replication-based storage systems using untrusted clouds , 2013, CODASPY.
[19] Reza Curtmola,et al. Remote data checking for network coding-based distributed storage systems , 2010, CCSW '10.
[20] Yang Tang,et al. NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds , 2014, IEEE Transactions on Computers.
[21] Xiaolei Dong,et al. Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..
[22] Tao Xiang,et al. Secure cloud storage meets with secure network coding , 2016, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[23] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[24] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[25] David Cash,et al. Dynamic Proofs of Retrievability Via Oblivious RAM , 2013, Journal of Cryptology.
[26] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[27] Hui Li,et al. Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud , 2015, IEEE Transactions on Services Computing.
[28] Nāgārjuna,et al. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding , 2014 .
[29] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[30] Zoe L. Jiang,et al. Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.
[31] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[32] Ari Juels,et al. Proofs of retrievability: theory and implementation , 2009, CCSW '09.