Secure provable data possession scheme with replication support in the cloud using Tweaks
暂无分享,去创建一个
[1] Bharadwaj Veeravalli,et al. Optimal metadata replications and request balancing strategy on cloud data centers , 2014, J. Parallel Distributed Comput..
[2] Ayad F. Barsoum,et al. Provable Possession and Replication of Data over Cloud Servers , 2011 .
[3] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[4] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[5] Jia Xu,et al. Towards efficient proofs of retrievability , 2012, ASIACCS '12.
[6] Albert Y. Zomaya,et al. Energy-efficient data replication in cloud computing datacenters , 2013, GLOBECOM Workshops.
[7] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[8] Reza Curtmola,et al. MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[9] Hai Jin,et al. RTRM: A Response Time-Based Replica Management Strategy for Cloud Storage System , 2013, GPC.
[10] M. Mrinalni Vaknishadh,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2012 .
[11] Wei Chen,et al. MORM: A Multi-objective Optimized Replication Management strategy for cloud storage cluster , 2014, J. Syst. Archit..
[12] Sarbjeet Singh,et al. Dynamic Cost-Aware Re-replication and Rebalancing Strategy in Cloud System , 2014, FICTA.
[13] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[14] Erol Gelenbe,et al. Energy-Efficient Cloud Computing , 2010, Comput. J..
[15] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.