메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1550-1557

Dynamic audit services for integrity verification of outsourced storages in clouds

Author keywords

dynamic audit; integrity verification; storage security

Indexed keywords

ABNORMAL DETECTION; AUDIT SERVICES; AUDIT SYSTEMS; COMPUTATION OVERHEADS; DYNAMIC AUDIT; INTEGRITY VERIFICATION; RANDOM SAMPLING; STORAGE SECURITY;

EID: 79959325063     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1982185.1982514     Document Type: Conference Paper
Times cited : (207)

References (13)
  • 2
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • proceedings of CRYPTO'04, Springer-Verlag
    • D. Boneh, X. Boyen, and H. Shacham. Short group signatures. In In proceedings of CRYPTO'04, volume 3152 of LNCS, pages 41-55. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 3
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Advances in Cryptology (CRYPTO'01)
    • D. Boneh and M. Franklin. Identity-based encryption from the weil pairing. In Advances in Cryptology (CRYPTO'01), volume 2139 of LNCS, pages 213-229, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 6
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C.-P. Schnorr. Efficient signature generation by smart cards. J. Cryptology, 4(3):161-174, 1991.
    • (1991) J. Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.-P.1
  • 8
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • 14-19
    • C. Wang, Q. Wang, K. Ren, and W. Lou. Privacy-preserving public auditing for data storage security in cloud computing. In INFOCOM, 2010 Proceedings IEEE, pages 1-9, 14-19 2010.
    • (2010) INFOCOM, 2010 Proceedings IEEE , pp. 1-9
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 9
    • 84997556980 scopus 로고    scopus 로고
    • Integrity auditing of outsourced data
    • C. Koch, J. Gehrke, M. N. Garofalakis, D. Srivastava, K. Aberer, A. Deshpande, D. Florescu, C. Y. Chan, V. Ganti, C.-C. Kanne, W. Klas, and E. J. Neuhold, editors, ACM
    • M. Xie, H. Wang, J. Yin, and X. Meng. Integrity auditing of outsourced data. In C. Koch, J. Gehrke, M. N. Garofalakis, D. Srivastava, K. Aberer, A. Deshpande, D. Florescu, C. Y. Chan, V. Ganti, C.-C. Kanne, W. Klas, and E. J. Neuhold, editors, VLDB, pages 782-793. ACM, 2007.
    • (2007) VLDB , pp. 782-793
    • Xie, M.1    Wang, H.2    Yin, J.3    Meng, X.4
  • 10
    • 77950845927 scopus 로고    scopus 로고
    • Baf: An efficient publicly verifiable secure audit logging scheme for distributed systems
    • A. A. Yavuz and P. Ning. Baf: An efficient publicly verifiable secure audit logging scheme for distributed systems. In ACSAC, pages 219-228, 2009.
    • (2009) ACSAC , pp. 219-228
    • Yavuz, A.A.1    Ning, P.2
  • 11
    • 84885684056 scopus 로고    scopus 로고
    • Strong accountability for network storage
    • USENIX
    • A. R. Yumerefendi and J. S. Chase. Strong accountability for network storage. In FAST, pages 77-92. USENIX, 2007.
    • (2007) FAST , pp. 77-92
    • Yumerefendi, A.R.1    Chase, J.S.2
  • 12
    • 79959319539 scopus 로고    scopus 로고
    • Technical Report PKU-CSE-10-04, Peking University and Arizona State University, April
    • Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau. Cooperative provable data possession. Technical Report PKU-CSE-10-04, http://eprint.iacr. org/2010/234.pdf, Peking University and Arizona State University, April 2010.
    • (2010) Cooperative Provable Data Possession
    • Zhu, Y.1    Wang, H.2    Hu, Z.3    Ahn, G.-J.4    Hu, H.5    Yau, S.S.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.