Towards Dynamic Remote Data Auditing in Computational Clouds
暂无分享,去创建一个
Nor Badrul Anuar | Abdullah Gani | Adnan Akhunzada | Mehdi Sookhak | Muhammad Khurram Khan | N. B. Anuar | A. Gani | Muhammad Khurram Khan | Adnan Akhunzada | Mehdi Sookhak
[1] Rosario Gennaro,et al. Algebraic (Trapdoor) One-Way Functions and Their Applications , 2013, TCC.
[2] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[3] Yihua Zhang,et al. Efficient Dynamic Provable Possession of Remote Data via Update Trees , 2016, TOS.
[4] Ejaz Ahmed,et al. A review on remote data auditing in single cloud server: Taxonomy and open issues , 2014, J. Netw. Comput. Appl..
[5] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[6] Xiaolei Dong,et al. Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..
[7] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[8] Witold Litwin,et al. Algebraic signatures for scalable distributed data structures , 2004, Proceedings. 20th International Conference on Data Engineering.
[9] A. Broder. Some applications of Rabin’s fingerprinting method , 1993 .
[10] Xiaohua Jia,et al. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.
[11] Li-Chun Wang,et al. A Security Framework of Group Location-Based Mobile Applications in Cloud Computing , 2011, 2011 40th International Conference on Parallel Processing Workshops.
[12] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[13] Huaqun Wang,et al. Proxy Provable Data Possession in Public Clouds , 2013, IEEE Transactions on Services Computing.
[14] David Cash,et al. Dynamic Proofs of Retrievability Via Oblivious RAM , 2013, Journal of Cryptology.
[15] Brian Beach. Simple Storage Service , 2014 .
[16] Leonid A. Levin,et al. Pseudo-random generation from one-way functions , 1989, STOC '89.
[17] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[18] Josep Domingo-Ferrer,et al. Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.
[19] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[20] Richard Wolski,et al. The Eucalyptus Open-Source Cloud-Computing System , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.
[21] Muhammad Khurram Khan,et al. An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards , 2006, ISPEC.
[22] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[23] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[24] Miroslaw Kutylowski,et al. Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques , 2012, NSS.
[25] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[26] Muhammad Khurram Khan,et al. Multimodal face and fingerprint biometrics authentication on space-limited tokens , 2008, Neurocomputing.
[27] William Pugh,et al. Skip Lists: A Probabilistic Alternative to Balanced Trees , 1989, WADS.
[28] Reza Curtmola,et al. Remote data checking using provable data possession , 2011, TSEC.
[29] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[30] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.
[31] Rajkumar Buyya,et al. A survey on vehicular cloud computing , 2014, J. Netw. Comput. Appl..
[32] Cong Wang,et al. Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.
[33] Ethan L. Miller,et al. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).