PTAD:Provable and Traceable Assured Deletion in Cloud Storage
暂无分享,去创建一个
Yahui Yang | Qingni Shen | Mengyu Zhang | Hecan Zhang | Qingni Shen | Yahui Yang | Hecan Zhang | Mengyu Zhang
[1] Shigang Chen,et al. On Deletion of Outsourced Data in Cloud Computing , 2014, 2014 IEEE 7th International Conference on Cloud Computing.
[2] Yang Tang,et al. Secure Overlay Cloud Storage with Access Control and Assured Deletion , 2012, IEEE Transactions on Dependable and Secure Computing.
[3] Gene Tsudik,et al. Secure Code Update for Embedded Devices via Proofs of Secure Erasure , 2010, ESORICS.
[4] Huseyin Cavusoglu,et al. Outsourcing Information Security: Contracting Issues and Security Implications , 2014, WEIS.
[5] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[6] Ashutosh Saxena,et al. Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing , 2010, CNSA.
[7] Ming Xu,et al. Enabling Assured Deletion in the Cloud Storage by Overwriting , 2016, SCC@AsiaCCS.
[8] V. Pradeep,et al. DELETING SECRET DATA WITH PUBLIC VERIFIABILITY , 2016 .
[9] Christian Cachin,et al. Architecture of the Hyperledger Blockchain Fabric , 2016 .
[10] Xiaofeng Chen,et al. Blockchain-based publicly verifiable data deletion scheme for cloud storage , 2018, J. Netw. Comput. Appl..
[11] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[12] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[13] Craig S. Wright,et al. Overwriting Hard Drive Data: The Great Wiping Controversy , 2008, ICISS.