A Multi-grained Log Auditing Scheme for Cloud Data Confidentiality
暂无分享,去创建一个
[1] Chin-Chen Chang,et al. Enabling public auditability for operation behaviors in cloud storage , 2016, Soft Computing.
[2] V. Sheng,et al. An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment , 2018 .
[3] Helen J. Wang,et al. Enabling Security in Cloud Storage SLAs with CloudProof , 2011, USENIX ATC.
[4] Ragib Hasan,et al. Trustworthy Digital Forensics in the Cloud , 2016, Computer.
[5] Panayiotis Kotzanikolaou,et al. A Framework for Secure and Verifiable Logging in Public Communication Networks , 2006, CRITIS.
[6] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[7] Peng Ning,et al. Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging , 2012, Financial Cryptography.
[8] Chin-Chen Chang,et al. Public audit for operation behavior logs with error locating in cloud storage , 2019, Soft Comput..
[9] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[10] Ainuddin Wahid Abdul Wahab,et al. CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics , 2018, IEEE Transactions on Sustainable Computing.
[11] Lei Liu,et al. Can an element form a two-dimensional nanosheet of type 15 pentagons? , 2018, Computational Materials Science.
[12] Cong Wang,et al. Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[13] Yonghong Chen,et al. Secure Logging and Public Audit for Operation Behavior in Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[14] Gene Tsudik,et al. A new approach to secure logging , 2008, TOS.
[15] Zhen Yang,et al. Ensuring reliable logging for data accountability in untrusted cloud storage , 2017, 2017 IEEE International Conference on Communications (ICC).
[16] Dan Lin,et al. Promoting Distributed Accountability in the Cloud , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[17] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[18] Dan Lin,et al. Ensuring Distributed Accountability for Data Sharing in the Cloud , 2012, IEEE Transactions on Dependable and Secure Computing.
[19] Anthony Skjellum,et al. OCF: An Open Cloud Forensics Model for Reliable Digital Forensics , 2015, 2015 IEEE 8th International Conference on Cloud Computing.
[20] Ke Zhou,et al. Using Blockchain for Data Auditing in Cloud Storage , 2018, ICCCS.
[21] Jie Wang,et al. Verifiable Diversity Ranking Search Over Encrypted Outsourced Data , 2018 .
[22] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.