An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
暂无分享,去创建一个
[1] Jian Yang,et al. Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing , 2011, J. Networks.
[2] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[3] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.
[4] R. Subramanian,et al. A Publicly Verifiable Dynamic Secret Sharing Protocol for Secure and Dependable Data Storage in Cloud Computing , 2012, Int. J. Cloud Appl. Comput..
[5] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[6] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[7] Stephen S. Yau,et al. Dynamic audit services for integrity verification of outsourced storages in clouds , 2011, SAC.
[8] Nenghai Yu,et al. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.
[9] Paul Bratley,et al. Algorithm 659: Implementing Sobol's quasirandom sequence generator , 1988, TOMS.
[10] Cong Wang,et al. Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.
[11] M. Anwar Hasan,et al. On Verifying Dynamic Multiple Data Copies over Cloud Servers , 2011, IACR Cryptol. ePrint Arch..
[12] Aarthi,et al. Towards Secure and Dependable Storage Services in Cloud Computing , 2014 .
[13] R. Subramanian,et al. RSA-based dynamic public audit service for integrity verification of data storage in cloud computing using Sobol sequence , 2012, Int. J. Cloud Comput..
[14] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[15] Adi Shamir,et al. How to share a secret , 1979, CACM.