RSA-based dynamic public audit service for integrity verification of data storage in cloud computing using Sobol sequence
暂无分享,去创建一个
[1] Jean-Jacques Quisquater,et al. Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers , 2003, IICIS.
[2] Josep Domingo-Ferrer,et al. Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.
[3] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[4] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[5] Ari Juels,et al. Proofs of retrievability: theory and implementation , 2009, CCSW '09.
[6] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[7] Stephen S. Yau,et al. Dynamic audit services for integrity verification of outsourced storages in clouds , 2011, SAC.
[8] M. Mrinalni Vaknishadh,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2012 .
[9] Mary Baker,et al. Auditing to Keep Online Storage Services Honest , 2007, HotOS.
[10] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[11] Paul Bratley,et al. Algorithm 659: Implementing Sobol's quasirandom sequence generator , 1988, TOMS.
[12] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[13] Gareth Jones,et al. Elementary number theory , 2019, The Student Mathematical Library.
[14] Brent Waters,et al. Short and Stateless Signatures from the RSA Assumption , 2009, CRYPTO.
[15] Aarthi,et al. Towards Secure and Dependable Storage Services in Cloud Computing , 2014 .
[16] Nenghai Yu,et al. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.
[17] Cong Wang,et al. Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.
[18] Paulo S. L. M. Barreto,et al. Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..
[19] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[20] Syamal K. Sen,et al. QUASI-VERSUS PSEUDO-RANDOM GENERATORS: DISCREPANCY, COMPLEXITY AND INTEGRATION-ERROR BASED COMPARISON , 2006 .