Enabling Cloud Storage Auditing with Key Exposure Resistance
暂无分享,去创建一个
[1] Gail-Joon Ahn,et al. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.
[2] Stephen S. Yau,et al. Efficient provable data possession for hybrid clouds , 2010, CCS '10.
[3] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[4] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[5] Xiaohua Jia,et al. Data storage auditing service in cloud computing: challenges, methods and opportunities , 2011, World Wide Web.
[6] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[7] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.
[8] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[9] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[10] Josep Domingo-Ferrer,et al. Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.
[11] Rong Hao,et al. Forward-secure identity-based signature: Security notions and construction , 2011, Inf. Sci..
[12] Mary Baker,et al. Auditing to Keep Online Storage Services Honest , 2007, HotOS.