메뉴 건너뛰기




Volumn , Issue , 2012, Pages 829-834

Integrity verification of multiple data copies over untrusted cloud servers

Author keywords

cryptographic protocols; data integrity; Outsourcing data storage

Indexed keywords

AUTHORIZED USERS; CLOUD SERVICES; CORRUPTED COPIES; CRYPTOGRAPHIC PROTOCOLS; DATA INTEGRITY; DATA STORAGE; MULTIPLE DATA; PUBLIC VERIFIABILITY;

EID: 84863686692     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CCGrid.2012.55     Document Type: Conference Paper
Times cited : (44)

References (19)
  • 2
    • 57049170853 scopus 로고    scopus 로고
    • Publicly verifiable remote data integrity
    • Proceedings of the 10th Int. Conference on Information and Communications Security, ser.
    • K. Zeng, "Publicly verifiable remote data integrity," in Proceedings of the 10th Int. Conference on Information and Communications Security, ser. ICICS '08, 2008, pp. 419-434.
    • ICICS '08, 2008 , pp. 419-434
    • Zeng, K.1
  • 4
    • 47849089563 scopus 로고    scopus 로고
    • Demonstrating data possession and uncheatable data transfer
    • ePrint Archive, Report 2006/150
    • D. L. G. Filho and P. S. L. M. Barreto, "Demonstrating data possession and uncheatable data transfer," Cryptology ePrint Archive, Report 2006/150, 2006.
    • (2006) Cryptology
    • Filho, D.L.G.1    Barreto, P.S.L.M.2
  • 6
    • 58349083629 scopus 로고    scopus 로고
    • Privacy-preserving audit and extraction of digital contents
    • ePrint Archive, Report 2008/186
    • M. A. Shah, R. Swaminathan, and M. Baker, "Privacy-preserving audit and extraction of digital contents," Cryptology ePrint Archive, Report 2008/186, 2008.
    • (2008) Cryptology
    • Shah, M.A.1    Swaminathan, R.2    Baker, M.3
  • 7
    • 33747176236 scopus 로고    scopus 로고
    • Authentication and integrity in outsourced databases
    • E. Mykletun, M. Narasimha, and G. Tsudik, "Authentication and integrity in outsourced databases," Trans. Storage, vol. 2, no. 2, 2006.
    • (2006) Trans. Storage , vol.2 , Issue.2
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 10
    • 57049174560 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • ePrint Archive, Report 2008/073
    • H. Shacham and B. Waters, "Compact proofs of retrievability, "Cryptology ePrint Archive, Report 2008/073, 2008.
    • (2008) Cryptology
    • Shacham, H.1    Waters, B.2
  • 11
    • 74049103479 scopus 로고    scopus 로고
    • PORs: Proofs of Retrievability for large files
    • A. Juels and B. S. Kaliski, "PORs: Proofs of Retrievability for large files," in CCS'07, 2007, pp. 584-597.
    • CCS'07, 2007 , pp. 584-597
    • Juels, A.1    Kaliski, B.S.2
  • 13
    • 74049136395 scopus 로고    scopus 로고
    • Proofs of retrievability: Theory and implementation
    • K. D. Bowers, A. Juels, and A. Oprea, "Proofs of retrievability: theory and implementation," in CCSW '09, 2009, pp. 43-54.
    • CCSW '09, 2009 , pp. 43-54
    • Bowers, K.D.1    Juels, A.2    Oprea, A.3
  • 14
    • 70350681128 scopus 로고    scopus 로고
    • Proofs of retrievability via hardness amplification
    • Y. Dodis, S. Vadhan, and D. Wichs, "Proofs of retrievability via hardness amplification," in TCC '09, 2009, pp. 109-127.
    • TCC '09, 2009 , pp. 109-127
    • Dodis, Y.1    Vadhan, S.2    Wichs, D.3
  • 15
    • 74049144464 scopus 로고    scopus 로고
    • Hail: A high-availability and integrity layer for cloud storage
    • K. D. Bowers, A. Juels, and A. Oprea, "Hail: a high-availability and integrity layer for cloud storage," in CCS '09, 2009, pp. 187-198.
    • CCS '09, 2009 , pp. 187-198
    • Bowers, K.D.1    Juels, A.2    Oprea, A.3
  • 16
    • 72449185582 scopus 로고    scopus 로고
    • Proofs of storage from homomorphic identification protocols
    • G. Ateniese, S. Kamara, and J. Katz, "Proofs of storage from homomorphic identification protocols," in ASIACRYPT '09, 2009, pp. 319-333.
    • ASIACRYPT '09, 2009 , pp. 319-333
    • Ateniese, G.1    Kamara, S.2    Katz, J.3
  • 17
    • 70349373534 scopus 로고    scopus 로고
    • An introduction to pairing-based cryptography
    • Online at
    • A. Menezes, "An introduction to pairing-based cryptography, "Lecture Notes 2005, Online at http://www.math.uwaterloo.ca/~ajmeneze/ publications/pairings.pdf.
    • (2005) Lecture Notes
    • Menezes, A.1
  • 19


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.