Secure Logging and Public Audit for Operation Behavior in Cloud Storage
暂无分享,去创建一个
Yonghong Chen | Hui Tian | Jing Lu | Tian Wang | Yiqiao Cai | Zhaoyi Chen | Fulin Nan
[1] Panayiotis Kotzanikolaou,et al. A Framework for Secure and Verifiable Logging in Public Communication Networks , 2006, CRITIS.
[2] Leonid Reyzin,et al. A New Forward-Secure Digital Signature Scheme , 2000, ASIACRYPT.
[3] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[4] Gene Tsudik,et al. A new approach to secure logging , 2008, TOS.
[5] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[6] Benny Pinkas,et al. Proofs of ownership in remote storage systems , 2011, CCS '11.
[7] Bruce Schneier,et al. Secure audit logs to support computer forensics , 1999, TSEC.
[8] Mihir Bellare,et al. A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.
[9] Shouhuai Xu,et al. Secure and efficient proof of storage with deduplication , 2012, CODASPY '12.
[10] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.
[11] Jin Liu,et al. Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage , 2017, IEEE Transactions on Services Computing.
[12] Peng Ning,et al. Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging , 2012, Financial Cryptography.
[13] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[14] Chin-Chen Chang,et al. Enabling public auditability for operation behaviors in cloud storage , 2016, Soft Computing.
[15] Ejaz Ahmed,et al. A review on remote data auditing in single cloud server: Taxonomy and open issues , 2014, J. Netw. Comput. Appl..
[16] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[17] Albert Y. Zomaya,et al. Remote Data Auditing in Cloud Computing Environments , 2015, ACM Comput. Surv..
[18] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[19] Rajkumar Buyya,et al. Dynamic remote data auditing for securing big data storage in cloud computing , 2017, Inf. Sci..
[20] Kent E. Seamons,et al. Logcrypt: Forward Security and Public Verification for Secure Audit Logs , 2005, IACR Cryptol. ePrint Arch..
[21] Christoph Wegener,et al. Technical Issues of Forensic Investigations in Cloud Computing Environments , 2011, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[22] Yong Yu,et al. Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.
[23] Mary Baker,et al. Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..
[24] Kim-Kwang Raymond Choo,et al. An integrated conceptual digital forensic framework for cloud computing , 2012, Digit. Investig..