메뉴 건너뛰기




Volumn , Issue , 2010, Pages 31-42

Remote data checking for network coding-based distributed storage systems

Author keywords

Archival storage; Distributed storage systems; Network coding; Pollution attack; Remote data checking; Replay attack; Security

Indexed keywords

ARCHIVAL STORAGE; DISTRIBUTED STORAGE SYSTEM; NETWORK CODING; POLLUTION ATTACK; REMOTE DATA; REPLAY ATTACK; SECURITY;

EID: 78650081896     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866835.1866842     Document Type: Conference Paper
Times cited : (159)

References (26)
  • 1
    • 78650128317 scopus 로고    scopus 로고
    • Reference model for an open archival information system (OAIS)
    • Reference model for an open archival information system (OAIS), 2001. Consultative Committee for Space Data Systems.
    • (2001) Consultative Committee for Space Data Systems
  • 3
    • 68849117052 scopus 로고    scopus 로고
    • Signing a linear subspace: Signature schemes for network coding
    • D. Boneh, D. Freeman, J. Katz, and B. Waters. Signing a linear subspace: Signature schemes for network coding. In Proc. PKC '09.
    • Proc. PKC '09
    • Boneh, D.1    Freeman, D.2    Katz, J.3    Waters, B.4
  • 4
    • 74049144464 scopus 로고    scopus 로고
    • HAIL: A high-availability and integrity layer for cloud storage
    • K. Bowers, A. Oprea, and A. Juels. HAIL: A high-availability and integrity layer for cloud storage. In Proc. of ACM CCS, 2009.
    • (2009) Proc. of ACM CCS
    • Bowers, K.1    Oprea, A.2    Juels, A.3
  • 14
    • 70449529634 scopus 로고    scopus 로고
    • A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding
    • August
    • Y. Jiang, Y. Fan, X. Shena, and C. Lin. A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding. Elsevier Computer Networks, August 2009.
    • (2009) Elsevier Computer Networks
    • Jiang, Y.1    Fan, Y.2    Shena, X.3    Lin, C.4
  • 15
    • 74049103479 scopus 로고    scopus 로고
    • PORs: Proofs of retrievability for large files
    • A. Juels and B. S. Kaliski. PORs: Proofs of retrievability for large files. In Proc. of ACM CCS, 2007.
    • (2007) Proc. of ACM CCS
    • Juels, A.1    Kaliski, B.S.2
  • 16
    • 0012048989 scopus 로고    scopus 로고
    • LFSR-based hashing and authentication
    • H. Krawczyk. LFSR-based hashing and authentication. In Crypto '94.
    • Crypto '94
    • Krawczyk, H.1
  • 20
    • 0012086874 scopus 로고
    • Bucket hashing and its application to fast message authentication
    • P. Rogaway. Bucket hashing and its application to fast message authentication. In Proc. of CRYPTO '95, 1995.
    • (1995) Proc. of CRYPTO '95
    • Rogaway, P.1
  • 21
    • 85077089362 scopus 로고    scopus 로고
    • Understanding latent sector errors and how to protect against them
    • B. Schroeder, S. Damouras, and P. Gill. Understanding latent sector errors and how to protect against them. In Proc. of FAST'10, 2010.
    • (2010) Proc. of FAST'10
    • Schroeder, B.1    Damouras, S.2    Gill, P.3
  • 23
    • 0003239571 scopus 로고    scopus 로고
    • On fast and provably secure message authentication based on universal hashing
    • V. Shoup. On fast and provably secure message authentication based on universal hashing. In Proc. of CRYPTO '96, 1996.
    • (1996) Proc. of CRYPTO '96
    • Shoup, V.1
  • 24
    • 70449569012 scopus 로고    scopus 로고
    • Ensuring data storage security in cloud computing
    • C. Wang, Q. Wang, K. Ren, and W. Lou. Ensuring data storage security in cloud computing. In Proc. of IWQoS, 2009.
    • (2009) Proc. of IWQoS
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 25
    • 18344385312 scopus 로고    scopus 로고
    • Erasure coding vs. Replication: A quantitiative comparison
    • H. Weatherspoon and J. D. Kubiatowicz. Erasure coding vs. replication: a quantitiative comparison. In Proc. of IPTPS, 2002.
    • (2002) Proc. of IPTPS
    • Weatherspoon, H.1    Kubiatowicz, J.D.2
  • 26
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. N. Wegman and J. L. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22(3):265 - 279, 1981.
    • (1981) Journal of Computer and System Sciences , vol.22 , Issue.3 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.