Renaissance System Model Improving Security and Third Party Auditing in Cloud Computing
暂无分享,去创建一个
[1] Kai Hwang,et al. Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[2] Daniele Catteddu and Giles Hogben. Cloud Computing. Benefits, risks and recommendations for information security , 2009 .
[3] Yunnan Wu,et al. A Survey on Network Codes for Distributed Storage , 2010, Proceedings of the IEEE.
[4] M. M. A. Hashem,et al. A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing Security Architecture , 2013, ArXiv.
[5] M. Phil,et al. PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .
[6] S. O. Kuyoro,et al. Cloud computing security issues and challenges , 2011 .
[7] Jing Li,et al. Study on the third-party audit in cloud storage service , 2011, 2011 International Conference on Cloud and Service Computing.
[8] Salve Bhagyashri Salve Bhagyashri,et al. Privacy-Preserving Public Auditing For Secure Cloud Storage , 2014 .
[9] Pritee Parwekar,et al. Public auditing: Cloud data storage , 2014, 2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence).
[10] Dirk Westhoff,et al. Privacy-friendly cloud audits with Somewhat Homomorphic and Searchable Encryption , 2014, 2014 14th International Conference on Innovations for Community Services (I4CS).
[11] Ahmad-Reza Sadeghi,et al. Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version) , 2011, Communications and Multimedia Security.
[12] V. Goutham,et al. Enabling Cloud Storage Auditing with Key Exposure Resistance , 2016 .
[13] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[14] Patrick P. C. Lee,et al. Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation , 2014, IEEE Transactions on Parallel and Distributed Systems.
[15] Reza Curtmola,et al. Remote data checking for network coding-based distributed storage systems , 2010, CCSW '10.
[16] Xiaohua Jia,et al. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.
[17] Ming Li,et al. Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings , 2010, SecureComm.
[18] Ahmad-Reza Sadeghi,et al. Twin Clouds: Secure Cloud Computing with , 2011 .
[19] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[20] K. Popovic,et al. Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.
[21] Xinxian Li,et al. Enterprise private cloud file encryption system based on tripartite secret key protocol , 2015 .