-
1
-
-
70449569012
-
Ensuring data storage security in cloud computing
-
July
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring Data Storage Security in Cloud Computing," Proc. 17th Int'l Workshop Quality of Service (IWQoS '09), pp. 1-9, July 2009.
-
(2009)
Proc. 17th Int'l Workshop Quality of Service (IWQoS '09)
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
2
-
-
84861932147
-
-
Amazon.com
-
Amazon.com, "Amazon Web Services (AWS)," http://aws. amazon.com, 2009.
-
(2009)
Amazon Web Services (AWS)
-
-
-
4
-
-
84862907810
-
Security challenges for the public cloud
-
K. Ren, C. Wang, and Q. Wang, "Security Challenges for the Public Cloud," IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.
-
(2012)
IEEE Internet Computing
, vol.16
, Issue.1
, pp. 69-73
-
-
Ren, K.1
Wang, C.2
Wang, Q.3
-
7
-
-
84861927875
-
-
Amazon.com, 2008 July
-
Amazon.com, "Amazon S3 Availability Event: July 20, 2008," http://status.aws.amazon.com/s3-20080720.html, July 2008.
-
(2008)
Amazon S3 Availability Event: July 20
-
-
-
8
-
-
77953318836
-
-
June
-
S. Wilson, "Appengine Outage," http://www.cio-weblog.com/ 50226711/appengine-outage.php, June 2008.
-
(2008)
Appengine Outage
-
-
Wilson, S.1
-
11
-
-
74049102823
-
Provable data possession at untrusted stores
-
Oct
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," Proc. 14th ACM Conf. Computer and Comm. Security (CCS '07), pp. 598-609, Oct. 2007.
-
(2007)
Proc. 14th ACM Conf. Computer and Comm. Security (CCS '07)
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
12
-
-
85016272824
-
Auditing to keep online storage services honest
-
M.A. Shah, M. Baker, J.C. Mogul, and R. Swaminathan, "Auditing to Keep Online Storage Services Honest," Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HotOS '07), pp. 1-6, 2007.
-
(2007)
Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HotOS '07)
, pp. 1-6
-
-
Shah, M.A.1
Baker, M.2
Mogul, J.C.3
Swaminathan, R.4
-
13
-
-
58349083629
-
Privacy-preserving audit and extraction of digital contents
-
Report 2008/186
-
M.A. Shah, R. Swaminathan, and M. Baker, "Privacy-Preserving Audit and Extraction of Digital Contents," Cryptology ePrint Archive, Report 2008/186, http://eprint.iacr.org, 2008.
-
Cryptology ePrint Archive
, pp. 2008
-
-
Shah, M.A.1
Swaminathan, R.2
Baker, M.3
-
14
-
-
70249129465
-
Scalable and efficient provable data possession
-
G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, "Scalable and Efficient Provable Data Possession," Proc. Fourth Int'l Conf. Security and Privacy in Comm. Netowrks (SecureComm '08), pp. 1-10, 2008.
-
(2008)
Proc. Fourth Int'l Conf. Security and Privacy in Comm. Netowrks (SecureComm '08)
, pp. 1-10
-
-
Ateniese, G.1
Pietro, R.D.2
Mancini, L.V.3
Tsudik, G.4
-
15
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing," Proc. 14th European Conf. Research in Computer Security (ESORICS '09), pp. 355-370, 2009.
-
(2009)
Proc. 14th European Conf. Research in Computer Security (ESORICS '09)
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
16
-
-
74049121230
-
Dynamic provable data possession
-
C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, "Dynamic Provable Data Possession," Proc. 16th ACM Conf. Computer and Comm. Security (CCS '09), pp. 213-222, 2009.
-
(2009)
Proc. 16th ACM Conf. Computer and Comm. Security (CCS '09)
, pp. 213-222
-
-
Erway, C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
-
18
-
-
74049136395
-
Proofs of retrievability: Theory and implementation
-
K.D. Bowers, A. Juels, and A. Oprea, "Proofs of Retrievability: Theory and Implementation," Proc. ACM Workshop Cloud Computing Security (CCSW '09), pp. 43-54, 2009.
-
(2009)
Proc. ACM Workshop Cloud Computing Security (CCSW '09)
, pp. 43-54
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
19
-
-
51849117195
-
Mr-pdp: Multiple-replica provable data possession
-
R. Curtmola, O. Khan, R. Burns, and G. Ateniese, "MR-PDP: Multiple-Replica Provable Data Possession," Proc. IEEE 28th Int'l Conf. Distributed Computing Systems (ICDCS '08), pp. 411-420, 2008.
-
(2008)
Proc. IEEE 28th Int'l Conf. Distributed Computing Systems (ICDCS '08)
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
-
21
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011.
-
(2011)
IEEE Trans. Parallel and Distributed Systems
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
22
-
-
84861959172
-
Privacy-preserving public auditing for secure cloud storage
-
preprint, doi:10.1109/TC.2011.245
-
C. Wang, S.S.M. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy- Preserving Public Auditing for Secure Cloud Storage," IEEE Trans. Computers, preprint, 2012, doi:10.1109/TC.2011.245.
-
(2012)
IEEE Trans. Computers
-
-
Wang, C.1
Chow, S.S.M.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
23
-
-
74049144464
-
Hail: A high-Availability and integrity layer for cloud storage
-
K.D. Bowers, A. Juels, and A. Oprea, "HAIL: A High-Availability and Integrity Layer for Cloud Storage," Proc. ACM Conf. Computer and Comm. Security (CCS '09), pp. 187-198, 2009.
-
(2009)
Proc. ACM Conf. Computer and Comm. Security (CCS '09)
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
24
-
-
33947694320
-
Store, forget, and check: Using algebraic signatures to check remotely administered storage
-
T. Schwarz and E.L. Miller, "Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage," Proc. IEEE Int'l Conf. Distributed Computing Systems (ICDCS '06), pp. 12-12, 2006.
-
(2006)
Proc. IEEE Int'l Conf. Distributed Computing Systems (ICDCS '06)
, pp. 12-12
-
-
Schwarz, T.1
Miller, E.L.2
-
25
-
-
85077532807
-
A cooperative internet backup scheme
-
M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard, "A Cooperative Internet Backup Scheme," Proc. USENIX Ann. Technical Conf. (General Track), pp. 29-41, 2003.
-
(2003)
Proc. USENIX Ann. Technical Conf. (General Track)
, pp. 29-41
-
-
Lillibridge, M.1
Elnikety, S.2
Birrell, A.3
Burrows, M.4
Isard, M.5
-
26
-
-
0345757358
-
Practical byzantine fault tolerance and proactive recovery
-
DOI 10.1145/571637.571640
-
M. Castro and B. Liskov, "Practical Byzantine Fault Tolerance and Proactive Recovery," ACM Trans. Computer Systems, vol. 20, no. 4, pp. 398-461, 2002. (Pubitemid 135702591)
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.4
, pp. 398-461
-
-
Castro, M.1
Liskov, B.2
-
27
-
-
0018456171
-
Universal hash functions
-
L. Carter and M. Wegman, "Universal Hash Functions," J. Computer and System Sciences, vol. 18, no. 2, pp. 143-154, 1979.
-
(1979)
J. Computer and System Sciences
, vol.18
, Issue.2
, pp. 143-154
-
-
Carter, L.1
Wegman, M.2
-
28
-
-
36849036863
-
Verifying distributed erasure-coded data
-
DOI 10.1145/1281100.1281122, PODC'07: Proceedings of the 26th Annual ACM Symposium on Principles of Distributed Computing
-
J. Hendricks, G. Ganger, and M. Reiter, "Verifying Distributed Erasure-Coded Data," Proc. 26th ACM Symp. Principles of Distributed Computing, pp. 139-146, 2007. (Pubitemid 350229310)
-
(2007)
Proceedings of the Annual ACM Symposium on Principles of Distributed Computing
, pp. 139-146
-
-
Hendricks, J.1
Ganger, G.R.2
Reiter, M.K.3
-
30
-
-
77953295132
-
Privacy-preserving public auditing for storage security in cloud computing
-
Mar
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Storage Security in Cloud Computing," Proc. IEEE INFOCOM, Mar. 2010.
-
(2010)
Proc. IEEE INFOCOM
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
31
-
-
77954843911
-
Towards publicly auditable secure cloud data storage services
-
July/Aug
-
C. Wang, K. Ren, W. Lou, and J. Li, "Towards Publicly Auditable Secure Cloud Data Storage Services," IEEE Network Magazine, vol. 24, no. 4, pp. 19-24, July/Aug. 2010.
-
(2010)
IEEE Network Magazine
, vol.24
, Issue.4
, pp. 19-24
-
-
Wang, C.1
Ren, K.2
Lou, W.3
Li, J.4
-
33
-
-
70349659577
-
Dependable and secure sensor data storage with dynamic integrity assurance
-
Apr
-
Q. Wang, K. Ren, W. Lou, and Y. Zhang, "Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance," Proc. IEEE INFOCOM, Apr. 2009.
-
(2009)
Proc. IEEE INFOCOM
-
-
Wang, Q.1
Ren, K.2
Lou, W.3
Zhang, Y.4
-
34
-
-
51749124474
-
-
Technical Report CS-08-627, Univ. of Tennessee, Aug
-
J.S. Plank, S. Simmerman, and C.D. Schuman, "Jerasure: A Library in C/C++ Facilitating Erasure Coding for Storage Applications-Version 1.2," Technical Report CS-08-627, Univ. of Tennessee, Aug. 2008.
-
(2008)
Jerasure: A Library in C/C++ Facilitating Erasure Coding for Storage Applications-Version 1.2
-
-
Plank, J.S.1
Simmerman, S.2
Schuman, C.D.3
-
35
-
-
35048891868
-
Keying hash functions for message authentication
-
Advances in Cryptology - CRYPTO '96
-
M. Bellare, R. Canetti, and H. Krawczyk, "Keying Hash Functions for Message Authentication," Proc. 16th Ann. Int'l Cryptology Conf. Advances in Cryptology (Crypto '96), pp. 1-15, 1996. (Pubitemid 126106226)
-
(1996)
Proc. 16th Ann. Int'l Cryptology Conf. Advances in Cryptology (Crypto '96)
, Issue.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
36
-
-
85024585723
-
Incremental cryptography: The case of hashing and signing
-
M. Bellare, O. Goldreich, and S. Goldwasser, "Incremental Cryptography: The Case of Hashing and Signing," Proc. 14th Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '94), pp. 216-233, 1994.
-
(1994)
Proc. 14th Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '94)
, pp. 216-233
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
37
-
-
47849089563
-
Demonstrating data possession and uncheatable data transfer
-
Report 2006/150
-
D.L.G. Filho and P.S.L.M. Barreto, "Demonstrating Data Possession and Uncheatable Data Transfer," Cryptology ePrint Archive, Report 2006/150, http://eprint.iacr.org, 2006.
-
Cryptology ePrint Archive
, pp. 2006
-
-
Filho, D.L.G.1
P.S.L.M. Barreto2
|