Auditing for Data Integrity and Reliability in Cloud Storage
暂无分享,去创建一个
Yu Chen | Bingwei Liu | Yu Chen | Bingwei Liu
[1] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[2] Jonathan Katz,et al. Proofs of Storage from Homomorphic Identification Protocols , 2009, ASIACRYPT.
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Siani Pearson,et al. Toward Accountability in the Cloud , 2011, IEEE Internet Computing.
[5] Yu Chen,et al. Bridging the Missing Link of Cloud Data Storage Security in AWS , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.
[6] Yu Chen,et al. A fair non-repudiation framework for data integrity in cloud storage services , 2013, Int. J. Cloud Comput..
[7] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[8] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[9] Forbes Gibb,et al. The information audit: Role and scope , 2007, Int. J. Inf. Manag..
[10] Cong Wang,et al. Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[11] Zhou Su,et al. Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).
[12] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[13] Yu Chen,et al. A fair multi-party non-repudiation scheme for storage clouds , 2011, 2011 International Conference on Collaboration Technologies and Systems (CTS).
[14] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, ASIACRYPT.
[15] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[16] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[17] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[18] D. Boneh,et al. Short Signatures from the Weil Pairing , 2001, Journal of Cryptology.