메뉴 건너뛰기




Volumn , Issue , 2010, Pages 97-103

Trusted data sharing over untrusted cloud storage providers

Author keywords

Cloud trust; Data sharing; Progressive encryption; Trusted cloud storage; Untrusted providers

Indexed keywords

ACCESS CONTROL POLICIES; AUTHORIZED USERS; CLOUD PROVIDERS; CLOUD SERVICES; COMPLETE CONTROL; COMPUTING INFRASTRUCTURES; COMPUTING PARADIGM; DATA SHARING; PROGRESSIVE ENCRYPTION; TRUSTED CLOUD STORAGE; UNTRUSTED PROVIDERS;

EID: 79952398762     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CloudCom.2010.36     Document Type: Conference Paper
Times cited : (80)

References (33)
  • 3
    • 33646514514 scopus 로고    scopus 로고
    • Bank outsources security to the cloud
    • Anonymous, December
    • Anonymous, "Bank outsources security to the cloud," COMMUNICATIONS NEWS, vol. 42, no. 12, December 2005.
    • (2005) Communications News , vol.42 , Issue.12
  • 4
    • 33748948241 scopus 로고    scopus 로고
    • Bank trusts security to 'the cloud'
    • September
    • -, "Bank trusts security to 'the cloud'," COMMUNICATIONS NEWS, vol. 43, no. 9, September 2006.
    • (2006) Communications News , vol.43 , Issue.9
  • 5
    • 77749299167 scopus 로고    scopus 로고
    • Apache Hadoop, 2009, http://hadoop.apache.org/.
    • (2009) Apache Hadoop
  • 10
    • 77956948573 scopus 로고    scopus 로고
    • Condor DAGman, 2009, http://www.cs.wisc.edu/condor/dagman/.
    • (2009) Condor DAGman
  • 12
    • 37549003336 scopus 로고    scopus 로고
    • MapReduce: Simplified data processing on large clusters
    • J. Dean and S. Ghemawat, "MapReduce: simplified data processing on large clusters," Commun. ACM, vol. 51, no. 1, pp. 107-113, 2008.
    • (2008) Commun. ACM , vol.51 , Issue.1 , pp. 107-113
    • Dean, J.1    Ghemawat, S.2
  • 13
    • 77954525794 scopus 로고    scopus 로고
    • Eucalyptus, 2009, http://eucalyptus.cs.ucsb.edu/.
    • (2009) Eucalyptus
  • 14
    • 77953072434 scopus 로고    scopus 로고
    • Google App Engine, 2009, http://appengine.google.com.
    • (2009) Google App Engine
  • 15
    • 2942579016 scopus 로고    scopus 로고
    • RFC 2634 - Enhanced Security Services for S/MIME
    • Network Working Group, June
    • P. Hoffman, "RFC 2634 - Enhanced Security Services for S/MIME," Network Working Group, Request For Comment, June 1999.
    • (1999) Request for Comment
    • Hoffman, P.1
  • 18
    • 70349309706 scopus 로고    scopus 로고
    • Data security in the world of cloud computing
    • July-August
    • L. Kaufman, "Data security in the world of cloud computing," IEEE SECURITY & PRIVACY, vol. 7, no. 4, July-August 2009.
    • (2009) IEEE Security & Privacy , vol.7 , Issue.4
    • Kaufman, L.1
  • 21
    • 79952378406 scopus 로고    scopus 로고
    • Nimbus, 2009, http://workspace.globus.org/.
    • (2009) Nimbus
  • 24
    • 79952371846 scopus 로고    scopus 로고
    • RFC 3851 - Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification
    • Network Working Group, July [Online]. Available
    • B. Ramsdell, "RFC 3851 - Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification," Network Working Group, Request For Comment, July 2004. [Online]. Available: http://www.faqs.org/ rfcs/rfc3851.html
    • (2004) Request for Comment
    • Ramsdell, B.1
  • 25
    • 79952427543 scopus 로고    scopus 로고
    • Salesforce, 2009, http://www.salesforce.com/.
    • (2009) Salesforce
  • 26
    • 0018545449 scopus 로고
    • How to share a secret
    • [Online]. Available
    • A. Shamir, "How to share a secret," Comm. ACM, vol. 22, no. 11, 1979. [Online]. Available: http://portal.acm.org/citation.cfm?id=359168.359176
    • (1979) Comm. ACM , vol.22 , Issue.11
    • Shamir, A.1
  • 27
    • 84925452156 scopus 로고    scopus 로고
    • Search-as-a-Service: Outsourced Search over Outsourced Storage
    • September
    • A. Singh, M. Srivatsa, and L. Liu, "Search-as-a-Service: Outsourced Search over Outsourced Storage," ACM TRANSACTIONS ON THE WEB, vol. 3, no. 4, September 2009.
    • (2009) ACM Transactions on the Web , vol.3 , Issue.4
    • Singh, A.1    Srivatsa, M.2    Liu, L.3
  • 29
    • 71749086537 scopus 로고    scopus 로고
    • Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
    • L. Yan, C. Rong, and G. Zhao, "Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography," in The First International Conference on Cloud Computing, 2009, pp. 167-177.
    • The First International Conference on Cloud Computing, 2009 , pp. 167-177
    • Yan, L.1    Rong, C.2    Zhao, G.3
  • 31
    • 71749114896 scopus 로고    scopus 로고
    • Cloud computing: A statistics aspect of users
    • The First International Conference on Cloud Computing, ser. M. G. Jaatun, G. Zhao, and C. Rong, Eds., Springer, [Online]. Available
    • G. Zhao, J. Liu, Y. Tang, W. Sun, F. Zhang, X. ping Ye, and N. Tang, "Cloud computing: A statistics aspect of users." in The First International Conference on Cloud Computing, ser. Lecture Notes in Computer Science, M. G. Jaatun, G. Zhao, and C. Rong, Eds., vol. 5931. Springer, 2009, pp. 347-358. [Online]. Available: http://dblp.unitrier.de/db/conf/cloudcom/ cloudcom2009.html#ZhaoLTSZYT09
    • (2009) Lecture Notes in Computer Science , vol.5931 , pp. 347-358
    • Zhao, G.1    Liu, J.2    Tang, Y.3    Sun, W.4    Zhang, F.5    Ping Ye, X.6    Tang, N.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.