메뉴 건너뛰기




Volumn , Issue , 2010, Pages 282-292

Secure provenance: The essential of bread and butter of data forensics in cloud computing

Author keywords

cloud computing; data forensics; privacy; provable security; secure provenance; standard model

Indexed keywords

ANONYMOUS AUTHENTICATION; BILINEAR PAIRING; CLOUD COMPUTING; DATA FORENSICS; DATA OBJECTS; INFORMATION CONFIDENTIALITY; PROCESS HISTORY; PROVABLE SECURITY; SENSITIVE DOCUMENTS; STANDARD MODEL; THE STANDARD MODEL; USER ACCESS;

EID: 77954472312     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1755688.1755723     Document Type: Conference Paper
Times cited : (158)

References (21)
  • 1
    • 38149009170 scopus 로고    scopus 로고
    • Short signatures without random oracles and the sdh assumption in bilinear groups
    • BONEH, D., AND BOYEN, X. Short signatures without random oracles and the sdh assumption in bilinear groups. Journal of Cryptology 21, 2 (2008), 149-177.
    • (2008) Journal of Cryptology , vol.21 , Issue.2 , pp. 149-177
    • Boneh, D.1    Boyen, X.2
  • 4
    • 63049096381 scopus 로고    scopus 로고
    • Cloud computing: Does nirvana hide behind the nebula?
    • March-April
    • ERDOGMUS, H. Cloud computing: Does nirvana hide behind the nebula? IEEE Software 11, 2 (March-April 2009), 4-6.
    • (2009) IEEE Software , vol.11 , Issue.2 , pp. 4-6
    • Erdogmus, H.1
  • 6
    • 77950567715 scopus 로고    scopus 로고
    • Privacy in the clouds: Risks to privacy and confidentiality from cloud computing
    • Tech. rep., February
    • GELLMAN, R. Privacy in the clouds: Risks to privacy and confidentiality from cloud computing. Tech. rep., February 2009. http://www.worldprivacyforum. org.
    • (2009)
    • Gellman, R.1
  • 7
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • GOLDWASSER, S., MICALI, S., AND RIVEST, R. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing 17, 2 (1988), 281-308.
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 10
    • 70349309706 scopus 로고    scopus 로고
    • Data security in the world of cloud computing
    • July-Aug.
    • KAUFMAN, L. M. Data security in the world of cloud computing. IEEE Security & Privacy 7, 4 (July-Aug. 2009), 61-64.
    • (2009) IEEE Security & Privacy , vol.7 , Issue.4 , pp. 61-64
    • Kaufman, L.M.1
  • 12
    • 36749076982 scopus 로고    scopus 로고
    • GSIS: A secure and privacy-preserving protocol for vehicular communications
    • DOI 10.1109/TVT.2007.906878
    • LIN, X., SUN, X., HO, P.-H., AND SHEN, X. GSIS: a secure and privacy-preserving protocol for vehicular communication. IEEE Transactions on Vehicular Technology 56, 6 (2007), 3442-3456. (Pubitemid 350201103)
    • (2007) IEEE Transactions on Vehicular Technology , vol.56 , Issue.6 I , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.-H.3    Shen, X.4
  • 16
    • 0035124553 scopus 로고    scopus 로고
    • When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web
    • LYNCH, C. A. When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web. Journal of the American Society for Information Sciene and Technology 52, 1 (2001), 12-17.
    • (2001) Journal of the American Society for Information Sciene and Technology , vol.52 , Issue.1 , pp. 12-17
    • Lynch, C.A.1
  • 18
    • 1642489925 scopus 로고    scopus 로고
    • Oaep reconsidered
    • SHOUP, V. Oaep reconsidered. Journal of Cryptology 15, 4 (2002), 223-249.
    • (2002) Journal of Cryptology , vol.15 , Issue.4 , pp. 223-249
    • Shoup, V.1
  • 19
    • 67651086975 scopus 로고    scopus 로고
    • A high-performance computing forecast: Partly cloudy
    • July-Aug.
    • STERLING, T., AND STARK, D. A high-performance computing forecast: Partly cloudy. Computing in Science & Engineering 11, 4 (July-Aug. 2009), 42-49.
    • (2009) Computing in Science & Engineering , vol.11 , Issue.4 , pp. 42-49
    • Sterling, T.1    Stark, D.2
  • 20
    • 63149163701 scopus 로고    scopus 로고
    • Cloud computing: New wine or just a new bottle?
    • March-April
    • VOAS, J., AND ZHANG, J. Cloud computing: New wine or just a new bottle? IT Professional 11, 2 (March-April 2009), 15-17.
    • (2009) IT Professional , vol.11 , Issue.2 , pp. 15-17
    • Voas, J.1    Zhang, J.2
  • 21
    • 69649091318 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • WATERS, B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. Cryptology ePrint Archive, Report 2008/290, 2008.
    • (2008) Cryptology EPrint Archive, Report 2008/290
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.