Enhanced public auditability & secure data storage in cloud computing
暂无分享,去创建一个
T. K. Chakraborty | A. Dhami | P. Bansal | T. Singh | Tamal Kanti Chakraborty | Anil Dhami | Prakhar Bansal | Tripti Singh
[1] Shobana,et al. Introducing Effective Third Party Auditing ( TPA ) for Data Storage Security in Cloud , .
[2] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[3] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[4] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[5] Abdulhadi Shoufan,et al. A fast hash tree generator for Merkle signature scheme , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.
[6] William R. Claycomb,et al. Insider Threats to Cloud Computing: Directions for New Research Challenges , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference.
[7] Jin H. Im,et al. Privacy , 2002, Encyclopedia of Information Systems.
[8] Willi Meier,et al. An attack on the isomorphisms of polynomials problem with one secret , 2003, International Journal of Information Security.
[9] Tsuyoshi Takagi,et al. Exceptional Procedure Attack on Elliptic Curve Cryptosystems , 2003, Public Key Cryptography.
[10] Xinlei Wang,et al. Research of cloud computing data security technology , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).
[11] Hong Zhao,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[12] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[13] Wei-Kuan Shih,et al. An Advanced ECC Dynamic ID-Based Remote Mutual Authentication Scheme for Cloud Computing , 2011, 2011 Fifth FTRA International Conference on Multimedia and Ubiquitous Engineering.
[14] Siani Pearson,et al. Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[15] Anja Becker,et al. Methods of Fault Analysis Attacks on Elliptic Curve Cryptosystems , 2006 .
[16] Satish Muppidi,et al. Data Security in Cloud Computing with Elliptic Curve Cryptography , 2012 .
[17] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[18] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.