Security and Analysis for Batch Transparency and Dynamic Storage in Cloud Computing
Abstract
Keywords
Full Text:
PDFReferences
A. Juels and B. S. Kaliski, Jr,( 2007), “Pors: proofs of retrievability for large files,” in Proc. of CCS’07. New York, NY, USA: ACM, pp. 584–597.
D. Boneh, B. Lynn, and H. Shacham, (2001), “Short signatures from the weil pairing,” in Proc. of ASIACRYPT’01. London, UK: Springer- Verlag, pp. 514–532.
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, (2007),“Provable data possession at untrusted stores,” in Proc. of CCS’07. New York, NY, USA: ACM, pp. 598–609.
G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, (2008), “Scalable and efficient provable data possession,” in Proc. of SecureComm’08. New York, NY, USA: ACM, pp. 1–10.
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, (2009), “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proc. of ESORICS’09. Saint Malo, France: Springer- Verlag, pp. 355–370.
Q. Wang, K. Ren, W. Lou, and Y. Zhang, (2009), “Dependable and secure sensor data storage with dynamic integrity assurance,” in Proc. of IEEE INFOCOM’09, Rio de Janeiro, Brazil, pp. 954– 962.
T. Schwarz and E. L. Miller, (2006), “Store, forget, and check: Using algebraic signatures to check remotely administered storage,” in Proc. of ICDCS’06, Lisboa, Portugal, pp. 12–12.
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proc. of ESORICS’09. Saint Malo, France: SpringerVerlag, 2009, pp. 355–370.
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proc. of CCS’07. New York, NY, USA: ACM, 2007, pp. 598–609.
A. Juels and B. S. Kaliski, Jr., “Pors: proofs of retrievability for large files,” in Proc. of CCS’07. New York, NY, USA: ACM, 2007, pp. 584–597.
H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proc. of ASIACRYPT’08. Melbourne, Australia: Springer-Verlag, 2008, pp. 90–107.
K. D. Bowers, A. Juels, and A. Oprea, “Proofs of retrievability:Theory and implementation,” Cryptology ePrint Archive, Report 2008/175, 2008.
M. Naor and G. N. Rothblum, “The complexity of online memory checking,” in Proc. of FOCS’05, Pittsburgh, PA, USA, 2005, pp. 573–584.
E.-C. Chang and J. Xu, “Remote integrity check with dishonest storage server,” in Proc. of ESORICS’08. Berlin, Heidelberg: Springer-Verlag, 2008, pp. 223–237
Qian Wang,Cong Wang,Kui Ren,Wenjing Lou and Jin Li ., “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing” International Workshop on Security and Privacy in Cloud Computing (ICDCS-SPCC), Macau, China, Jun. 18-21, 2012
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.