Efficient integrity verification of replicated data in cloud computing system
暂无分享,去创建一个
Mingxu Yi | Jinxia Wei | Lingwei Song | Jinxia Wei | M. Yi | Lingwei Song
[1] Nenghai Yu,et al. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.
[2] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, ASIACRYPT.
[3] Xiaohua Jia,et al. Data storage auditing service in cloud computing: challenges, methods and opportunities , 2011, World Wide Web.
[4] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[5] Elisa Bertino,et al. Single-Database Private Information Retrieval from Fully Homomorphic Encryption , 2013, IEEE Transactions on Knowledge and Data Engineering.
[6] Jean-Jacques Quisquater,et al. Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers , 2003, IICIS.
[7] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[8] M. Anwar Hasan,et al. On Verifying Dynamic Multiple Data Copies over Cloud Servers , 2011, IACR Cryptol. ePrint Arch..
[9] Gene Tsudik,et al. Authentication and integrity in outsourced databases , 2006, TOS.
[10] Michael Burrows,et al. A Cooperative Internet Backup Scheme , 2003, USENIX Annual Technical Conference, General Track.
[11] Mary Baker,et al. Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..
[12] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[13] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[14] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[15] Josep Domingo-Ferrer,et al. Identity-based remote data possession checking in public clouds , 2014, IET Inf. Secur..
[16] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[17] Mary Baker,et al. Auditing to Keep Online Storage Services Honest , 2007, HotOS.
[18] Paulo S. L. M. Barreto,et al. Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..
[19] Ke Zeng,et al. Publicly Verifiable Remote Data Integrity , 2008, ICICS.
[20] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[21] Josep Domingo-Ferrer,et al. Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.
[22] Stanislaw Jarecki,et al. Cryptographic Primitives Enforcing Communication and Storage Complexity , 2002, Financial Cryptography.
[23] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.
[24] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.