메뉴 건너뛰기




Volumn 32, Issue 7, 2011, Pages 153-160

Data outsourcing authentication model based on authenticated data structures for cloud computing

Author keywords

Authenticated data structures; Authenticated skip list; Cloud computing; Data outsourcing

Indexed keywords

AUTHENTICATED DATA STRUCTURES; AUTHENTICATION MODELS; AUTHENTICATION PROTOCOLS; DATA OUTSOURCING; DATA QUERY; DATA UPDATING; FORMAL DEFINITION; PERFORMANCE ANALYSIS; PROOF-GENERATION ALGORITHMS; SKIP LISTES;

EID: 80051555582     PISSN: 1000436X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (6)

References (14)
  • 1
    • 79951999348 scopus 로고    scopus 로고
    • Study on cloud computing Security
    • FENG D G, ZHANG M, ZHANG Y, et al. Study on cloud computing Security [J]. Journal of Software, 2011, 22 (1): 71-83.
    • (2011) Journal of Software , vol.22 , Issue.1 , pp. 71-83
    • Feng, D.G.1    Zhang, M.2    Zhang, Y.3
  • 2
    • 78649457543 scopus 로고    scopus 로고
    • Conjunct model of cloud & client computing based on multi-agent
    • XU X L, CHENG C L, XIONG J Y. Conjunct model of cloud & client computing based on multi-agent [J]. Journal on Communications, 2010, 31 (10): 203-211.
    • (2010) Journal on Communications , vol.31 , Issue.10 , pp. 203-211
    • Xu, X.L.1    Cheng, C.L.2    Xiong, J.Y.3
  • 3
    • 77955712658 scopus 로고    scopus 로고
    • Toward dynamic and attribute based publication, discovery and selection for cloud computing
    • GOSCINSKI A, BROCK M. Toward dynamic and attribute based publication, discovery and selection for cloud computing [J]. Future Generation Computer Systems, 2010, 26 (7): 947-970.
    • (2010) Future Generation Computer Systems , vol.26 , Issue.7 , pp. 947-970
    • Goscinski, A.1    Brock, M.2
  • 4
    • 65749084065 scopus 로고    scopus 로고
    • Cloud computing: System instances and current research
    • CHEN K, ZHENG W M. Cloud computing: system instances and current research [J]. Journal of Software, 2009, 20 (5): 1337-1348.
    • (2009) Journal of Software , vol.20 , Issue.5 , pp. 1337-1348
    • Chen, K.1    Zheng, W.M.2
  • 5
    • 77950572596 scopus 로고    scopus 로고
    • Server transparent query authentication of outsourced database
    • ZHANG M, HONG C, CHEN C. Server transparent query authentication of outsourced database [J]. Journal of Computer Research and Development, 2010, 47 (1): 182-190.
    • (2010) Journal of Computer Research and Development , vol.47 , Issue.1 , pp. 182-190
    • Zhang, M.1    Hong, C.2    Chen, C.3
  • 7
    • 74049103479 scopus 로고    scopus 로고
    • Pors: Proofs of retrievability for large files
    • Alexandria, VA, USA
    • JUELS A, KALISKI B. Pors: proofs of retrievability for large files [A]. Proceedings of CCS 2007 [C]. Alexandria, VA, USA, 2007. 584-597.
    • (2007) Proceedings of CCS 2007 , pp. 584-597
    • Juels, A.1    Kaliski, B.2
  • 8
    • 74049102823 scopus 로고    scopus 로고
    • Provable data possession at untrusted stores
    • Alexandria, VA, USA
    • ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores [A]. Proceedings of CCS 2007 [C]. Alexandria, VA, USA, 2007. 598-609.
    • (2007) Proceedings of CCS 2007 , pp. 598-609
    • Ateniese, G.1    Burns, R.2    Curtmola, R.3
  • 9
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • Melbourne, Australia
    • SHACHAM H, WATERS B. Compact proofs of retrievability [A]. Proceedings of ASIACRYPT 2008 [C]. Melbourne, Australia, 2008. 90-107.
    • (2008) Proceedings of ASIACRYPT 2008 , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 10
    • 70249129465 scopus 로고    scopus 로고
    • Scalable and efficient provable data possession
    • Istanbul, Turkey
    • ATENIESE G, PIETRO D, MANCINI R, et al. Scalable and efficient provable data possession [A]. Proceedings of SecureComm 2008 [C]. Istanbul, Turkey, 2008. 1-10.
    • (2008) Proceedings of SecureComm 2008 , pp. 1-10
    • Ateniese, G.1    Pietro, D.2    Mancini, R.3
  • 11
    • 78650266531 scopus 로고    scopus 로고
    • Optimal authenticated data structures with multilinear forms
    • Ishikawa, Japan
    • PAPAMANTHOU C, TAMASSIA R, TRIANDOPOULOS N. Optimal authenticated data structures with multilinear forms [A]. Proceedings of Pairing 2010 [C]. Ishikawa, Japan, 2010. 246-264.
    • (2010) Proceedings of Pairing 2010 , pp. 246-264
    • Papamanthou, C.1    Tamassia, R.2    Triandopoulos, N.3
  • 12
    • 9444241581 scopus 로고    scopus 로고
    • Study on authenticated dictionary and its applications in PKI
    • QING S H, ZHOU Y B, ZHANG Z F, et al. Study on authenticated dictionary and its applications in PKI [J]. Acta Electronica Sinica, 2004, 32 (8): 1356-1359.
    • (2004) Acta Electronica Sinica , vol.32 , Issue.8 , pp. 1356-1359
    • Qing, S.H.1    Zhou, Y.B.2    Zhang, Z.F.3
  • 13
    • 21044438930 scopus 로고    scopus 로고
    • A general model for authenticated data structures
    • MARTEL C, NUCKOLLS G, DEVANBU P, et al. A general model for authenticated data structures [J]. Algorithmica, 2004, 39 (1): 21-41.
    • (2004) Algorithmica , vol.39 , Issue.1 , pp. 21-41
    • Martel, C.1    Nuckolls, G.2    Devanbu, P.3
  • 14
    • 21044449695 scopus 로고    scopus 로고
    • Persistent authenticated dictionaries and their applications
    • Malaga, Spain
    • ANAGNOSTOPOULOS A, GOODRICH M T, TAMASSIA R. Persistent authenticated dictionaries and their applications [A]. Proceedings of ISC 2001 [C]. Malaga, Spain, 2001. 379-393.
    • (2001) Proceedings of ISC 2001 , pp. 379-393
    • Anagnostopoulos, A.1    Goodrich, M.T.2    Tamassia, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.