메뉴 건너뛰기




Volumn 33, Issue 9, 2011, Pages 2199-2204

A homomorphic hashing based provable data possession

Author keywords

Cloud storage; Data integrity; Homomorphic hashing; Provable Data Possession (PDP); Storage security

Indexed keywords

DATA BLOCKS; DATA INTEGRITY; DATA LIFECYCLE; HASH ALGORITHM; HASH COMPUTATION; HASH VALUE; HOMOMORPHIC HASHING; INTEGRITY PROTECTION; PROVABLE DATA POSSESSION (PDP); SECURITY AND PERFORMANCE; STORAGE SECURITY; STORAGE SERVERS; STORAGE SERVICES;

EID: 80053975961     PISSN: 10095896     EISSN: None     Source Type: Journal    
DOI: 10.3724/SP.J.1146.2011.00001     Document Type: Article
Times cited : (17)

References (20)
  • 2
    • 74049102823 scopus 로고    scopus 로고
    • Provable data possession at untrusted stores
    • Alexandria, Virginia, USA, Oct. 28-31
    • Ateniese G, Burns R, Curtmola R, et al.. Provable data possession at untrusted stores. Proceedings of ACM-CCS'07, Alexandria, Virginia, USA, Oct. 28-31, 2007: 598-609.
    • (2007) Proceedings of ACM-CCS'07 , pp. 598-609
    • Ateniese, G.1    Burns, R.2    Curtmola, R.3
  • 3
    • 72449185582 scopus 로고    scopus 로고
    • Proofs of Storage from homomorphic identification protocols
    • Tokyo, Japan, Dec. 6-10
    • Ateniese G. Kamara S, and Katz J. Proofs of Storage from homomorphic identification protocols. Proceedings of ASIACRYPT'09, Tokyo, Japan, Dec. 6-10, 2009: 319-333.
    • (2009) Proceedings of ASIACRYPT'09 , pp. 319-333
    • Ateniese, G.1    Kamara, S.2    Katz, J.3
  • 4
    • 70249129465 scopus 로고    scopus 로고
    • Scalable and efficient provable data possession
    • Istanbul, Turkey, Sept. 22-26
    • Ateniese G, Pietro R D, Mancini L V, et al.. Scalable and efficient provable data possession. Proceedings of SecureComm'08, Istanbul, Turkey, Sept. 22-26, 2008: 1-10.
    • (2008) Proceedings of SecureComm'08 , pp. 1-10
    • Ateniese, G.1    Pietro, R.D.2    Mancini, L.V.3
  • 5
    • 51849117195 scopus 로고    scopus 로고
    • MR-PDP: Multiple-replica provable data possession
    • Beijing, China, June 19
    • Curtmola R, Khan O, Burns R, and Ateniese G. MR-PDP: multiple-replica provable data possession. Proceedings of ICDCS'08, Beijing, China, June 19, 2008: 411-420.
    • (2008) Proceedings of ICDCS'08 , pp. 411-420
    • Curtmola, R.1    Khan, O.2    Burns, R.3    Ateniese, G.4
  • 6
    • 80053965686 scopus 로고    scopus 로고
    • Chinese source
    • 2009, 46(10): 1660-1668.
    • (2009) , vol.46 , Issue.10 , pp. 1660-1668
  • 7
    • 74049121230 scopus 로고    scopus 로고
    • Dynamic provable data possession
    • Chicago, Illinois, USA, Nov. 9-13
    • Erway C, Küpçü A, Papamanthou C, et al.. Dynamic provable data possession. Proceedings of ACM-CCS'09, Chicago, Illinois, USA, Nov. 9-13, 2009: 213-222.
    • (2009) Proceedings of ACM-CCS'09 , pp. 213-222
    • Erway, C.1    Küpçü, A.2    Papamanthou, C.3
  • 8
    • 74049103479 scopus 로고    scopus 로고
    • Pors: Proofs of retrievability for large files
    • Alexandria, Virginia, USA, Oct. 28-31
    • Juels A and Kaliski B S. Pors: proofs of retrievability for large files. Proceedings of ACM-CCS'07, Alexandria, Virginia, USA, Oct. 28-31, 2007: 584-597.
    • (2007) Proceedings of ACM-CCS'07 , pp. 584-597
    • Juels, A.1    Kaliski, B.S.2
  • 9
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • Melbourne, Australia, Dec. 7-11
    • Shacham H and Waters B. Compact proofs of retrievability. Proceedings of ASIACRYPT'08, Melbourne, Australia, Dec. 7-11, 2008: 90-107.
    • (2008) Proceedings of ASIACRYPT'08 , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 10
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Boneh D, Lynn B, and Shacham H. Short signatures from the Weil pairing. Journal of Cryptology, 2004, 17(4): 297-319.
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 11
    • 70350681128 scopus 로고    scopus 로고
    • Proofs of retrievability via hardness amplification
    • San Francisco, CA, USA, Mar. 15-17
    • Dodis Y, Vadhan S, and Wichs D. Proofs of retrievability via hardness amplification. Proceedings of TCC'09, San Francisco, CA, USA, Mar. 15-17, 2009: 109-127.
    • (2009) Proceedings of TCC'09 , pp. 109-127
    • Dodis, Y.1    Vadhan, S.2    Wichs, D.3
  • 12
    • 74049136395 scopus 로고    scopus 로고
    • Proofs of retrievability: Theory and implementation
    • Chicago, Illinois, USA, Nov. 9-13
    • Bowers K D, Juels A, and Oprea A. Proofs of retrievability: theory and implementation. Proceedings of ACM-CCSW'09, Chicago, Illinois, USA, Nov. 9-13, 2009: 43-54.
    • (2009) Proceedings of ACM-CCSW'09 , pp. 43-54
    • Bowers, K.D.1    Juels, A.2    Oprea, A.3
  • 13
    • 74049144464 scopus 로고    scopus 로고
    • HAIL: A high-availability and integrity layer for cloud storage
    • Chicago, Illinois, USA, Nov. 9-13
    • Bowers K D, Juels A, and Oprea A. HAIL: a high-availability and integrity layer for cloud storage. Proceedings of ACM-CCS'09, Chicago, Illinois, USA, Nov. 9-13, 2009: 187-198.
    • (2009) Proceedings of ACM-CCS'09 , pp. 187-198
    • Bowers, K.D.1    Juels, A.2    Oprea, A.3
  • 14
    • 70449569012 scopus 로고    scopus 로고
    • Ensuring data storage security in cloud computing
    • Charleston, South Carolina, July 13-15
    • Wang C, Wang Q, Ren K, et al.. Ensuring data storage security in cloud computing. Proceedings of IWQoS'09, Charleston, South Carolina, July 13-15, 2009: 1-9.
    • (2009) Proceedings of IWQoS'09 , pp. 1-9
    • Wang, C.1    Wang, Q.2    Ren, K.3
  • 15
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing
    • Saint Malo, France, Sept. 21-25
    • Wang Q, Wang C, Li J, Ren K, et al.. Enabling public verifiability and data dynamics for storage security in cloud computing. Proceedings of ESORICS'09, Saint Malo, France, Sept. 21-25, 2009: 355-370.
    • (2009) Proceedings of ESORICS'09 , pp. 355-370
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4
  • 16
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • San Diego, CA, Mar
    • Wang C, Wang Q, Ren K, et al.. Privacy-preserving public auditing for data storage security in cloud computing. Proceedings of INFOCOM 2010, San Diego, CA, Mar. 2010: 525-533.
    • (2010) Proceedings of INFOCOM 2010 , pp. 525-533
    • Wang, C.1    Wang, Q.2    Ren, K.3
  • 17
    • 29344447400 scopus 로고    scopus 로고
    • Schneier on security
    • Bruce Schneier. Schneier on Security. http://www.schneier.com/blog/archives/2009/07/ homomorphic_enc.html.
    • Schneier, B.1
  • 18
    • 3543050732 scopus 로고    scopus 로고
    • On-the-fly verification of rateless erasure codes for efficient content distribution
    • Berkeley, California, May 9-12
    • Krohn M N, Freedman M J, and Mazières D. On-the-fly verification of rateless erasure codes for efficient content distribution. Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, California, May 9-12, 2004: 226-240.
    • (2004) Proceedings of the IEEE Symposium on Security and Privacy , pp. 226-240
    • Krohn, M.N.1    Freedman, M.J.2    Mazières, D.3
  • 19
    • 85024585723 scopus 로고
    • Incremental cryptography: The case of hashing and signing
    • Santa Barbara, CA, Aug.
    • Bellare M, Goldreich O, and Goldwasser S. Incremental cryptography: the case of hashing and signing. Advances in Cryptology-CRYPTO'94, Santa Barbara, CA, Aug. 1994: 216-233.
    • (1994) Advances in Cryptology-CRYPTO'94 , pp. 216-233
    • Bellare, M.1    Goldreich, O.2    Goldwasser, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.