Secuirty storage in the Cloud Computing: A RSA-based assumption data integrity check without original data
暂无分享,去创建一个
[1] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[2] Mary Baker,et al. Auditing to Keep Online Storage Services Honest , 2007, HotOS.
[3] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[4] Michael K. Reiter,et al. Space-Efficient Block Storage Integrity , 2005, NDSS.
[5] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[6] Ari Juels,et al. Proofs of retrievability: theory and implementation , 2009, CCSW '09.
[7] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[8] Paulo S. L. M. Barreto,et al. Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..
[9] Mary Baker,et al. Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..
[10] Sawan Kumar,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[11] Wenjing Lou,et al. Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, IEEE INFOCOM 2009.
[12] Ethan L. Miller,et al. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[13] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[14] Jia Xu,et al. Remote Integrity Check with Dishonest Storage Server , 2008, ESORICS.
[15] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[16] Moni Naor,et al. The complexity of online memory checking , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[17] J. Maxwell. A Treatise on Electricity and Magnetism , 1873, Nature.