Enable data dynamics for algebraic signatures based remote data possession checking in the cloud storage
暂无分享,去创建一个
Wang Dongsheng | Xu Ming | Luo Yuchuan | Fu Shaojing | Yuchuan Luo | Dongsheng Wang | W. Dongsheng | Fu Shaojing | Xu Ming | Luo Yuchuan | Shaojing Fu
[1] Nenghai Yu,et al. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.
[2] Ethan L. Miller,et al. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[3] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[4] Elaine Shi,et al. Practical dynamic proofs of retrievability , 2013, CCS.
[5] Ming Li,et al. Storing Shared Data on the Cloud via Security-Mediator , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.
[6] Idit Keidar,et al. Trusting the cloud , 2009, SIGA.
[7] Paulo S. L. M. Barreto,et al. Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..
[8] Lanxiang Chen,et al. Using algebraic signatures to check data possession in cloud storage , 2013, Future Gener. Comput. Syst..
[9] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[10] David Cash,et al. Dynamic Proofs of Retrievability via Oblivious RAM , 2013, EUROCRYPT.
[11] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[12] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[13] Ming Xu,et al. Cryptanalysis of Remote Data Integrity Checking Protocol Proposed by L. Chen for Cloud Storage , 2014, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[14] Josep Domingo-Ferrer,et al. Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.
[15] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[16] Jean-Jacques Quisquater,et al. Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers , 2003, IICIS.
[17] J.L. Massey. The theory of error-correcting codes , 1980, Proceedings of the IEEE.
[18] Gail-Joon Ahn,et al. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.
[19] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[20] Hui Li,et al. Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud , 2015, IEEE Transactions on Services Computing.