An Overview on Privacy Preservation and Public Auditing on Outsourced Cloud Data
暂无分享,去创建一个
Nileshsingh V. Thakur | Shailesh D. Kamble | Nilesh Sambhe | Sonali D. Khambalkar | Nikhil Mangrulkar
[1] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[2] Patrick P. C. Lee,et al. Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation , 2014, IEEE Transactions on Parallel and Distributed Systems.
[3] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[4] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[5] Reza Curtmola,et al. MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[6] Cong Wang,et al. Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.
[7] Cong Wang,et al. Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[8] Tracey Ho,et al. A Random Linear Network Coding Approach to Multicast , 2006, IEEE Transactions on Information Theory.
[9] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, ASIACRYPT.
[10] D. Boneh,et al. Short Signatures from the Weil Pairing , 2001, Journal of Cryptology.
[11] Yunnan Wu,et al. Network coding for distributed storage systems , 2010, IEEE Trans. Inf. Theory.
[12] Reza Curtmola,et al. Remote data checking for network coding-based distributed storage systems , 2010, CCSW '10.
[13] Jonathan Katz,et al. Secure Network Coding Over the Integers , 2010, IACR Cryptol. ePrint Arch..
[14] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[15] Gail-Joon Ahn,et al. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.
[16] Yunnan Wu,et al. A Survey on Network Codes for Distributed Storage , 2010, Proceedings of the IEEE.
[17] Yang Tang,et al. NCCloud: applying network coding for the storage repair in a cloud-of-clouds , 2012, FAST.
[18] Yanchun Zhang,et al. Distributed data possession checking for securing multiple replicas in geographically-dispersed clouds , 2012, J. Comput. Syst. Sci..
[19] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[20] Jonathan Katz,et al. Signing a Linear Subspace: Signature Schemes for Network Coding , 2009, IACR Cryptol. ePrint Arch..
[21] A. Miyaji,et al. New Explicit Conditions of Elliptic Curve Traces for FR-Reduction , 2001 .
[22] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[23] Xiaohua Jia,et al. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.
[24] Chunxiang Xu,et al. Secure and efficient privacy-preserving public auditing scheme for cloud storage , 2014, Comput. Electr. Eng..