Cloud Data Auditing Techniques with a Focus on Privacy and Security
暂无分享,去创建一个
[1] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[2] Jonathan Katz,et al. Proofs of Storage from Homomorphic Identification Protocols , 2009, ASIACRYPT.
[3] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[4] Dan Boneh,et al. Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures , 2011, Public Key Cryptography.
[5] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[6] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[7] Cong Wang,et al. Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.
[8] T. Sudha,et al. Oruta: Privacy- Preserving Public Auditing for Shared Data in the Cloud , 2018 .
[9] Marten van Dijk,et al. On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing , 2010, HotSec.
[10] Noen Given. Knox : Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud , 2012 .
[11] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[12] Xiaohua Jia,et al. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.
[13] Xiaohua Jia,et al. Security for Cloud Storage Systems , 2013, SpringerBriefs in Computer Science.
[14] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[15] Matthew Green,et al. Practical Short Signature Batch Verification , 2009, CT-RSA.
[16] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[17] Cong Wang,et al. Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[18] Hui Li,et al. Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud , 2015, IEEE Transactions on Services Computing.
[19] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[20] Ayman I. Kayssi,et al. Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[21] Jinjun Chen,et al. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates , 2014, IEEE Transactions on Parallel and Distributed Systems.
[22] M. Mrinalni Vaknishadh,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2012 .
[23] D. Boneh,et al. A Survey of Two Signature Aggregation Techniques , 2003 .
[24] Tatsuaki Okamoto,et al. Homomorphic Signatures for Polynomial Functions with Shorter Signatures , 2013 .
[25] Luís Bastião,et al. A common API for delivering services over multi-vendor cloud resources , 2013, J. Syst. Softw..
[26] Wei Xie,et al. Security and Privacy in Cloud Computing: A Survey , 2010, 2010 Sixth International Conference on Semantics, Knowledge and Grids.
[27] Zhihua Xia,et al. An Efficient and Privacy-Preserving Semantic Multi-Keyword Ranked Search over Encrypted Cloud Data , 2013 .
[28] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[29] B. Kaliski,et al. Message Authentication with MD 5 * , 1995 .
[30] Salve Bhagyashri Salve Bhagyashri,et al. Privacy-Preserving Public Auditing For Secure Cloud Storage , 2014 .