메뉴 건너뛰기




Volumn , Issue , 2012, Pages 155-160

NC-Audit: Auditing for network coding storage

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); CRYPTOGRAPHY; DIGITAL STORAGE; NETWORK SECURITY; REPAIR;

EID: 84866669823     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/netcod.2012.6261901     Document Type: Conference Paper
Times cited : (30)

References (32)
  • 1
    • 79951957726 scopus 로고    scopus 로고
    • A survey on network codes for distributed storage
    • Mar.
    • A. G. Dimakis, K. Ramchandran, Y. Wu, and C. Sun, "A Survey on Network Codes for Distributed Storage" Proc. of the IEEE, vol. 99, no. 3, pp. 476-489, Mar. 2011.
    • (2011) Proc. of the IEEE , vol.99 , Issue.3 , pp. 476-489
    • Dimakis, A.G.1    Ramchandran, K.2    Wu, Y.3    Sun, C.4
  • 4
    • 79960034808 scopus 로고    scopus 로고
    • Understanding latent sector errors and how to protect against them
    • San Jose, CA, Sep.
    • B. Schroeder, S. Damouras, and P. Gill, "Understanding latent sector errors and how to protect against them," in USENIX FAST, San Jose, CA, Sep. 2010, pp. 1-23.
    • (2010) USENIX FAST , pp. 1-23
    • Schroeder, B.1    Damouras, S.2    Gill, P.3
  • 6
    • 58349083629 scopus 로고    scopus 로고
    • Privacy-preserving audit and extraction of digital contents
    • Report 2008/186
    • M. A. Shah, R. Swaminathan, and M. Baker, "Privacy-Preserving Audit and Extraction of Digital Contents," in Cryptology ePrint Archive, Report 2008/186, 2008.
    • (2008) Cryptology EPrint Archive
    • Shah, M.A.1    Swaminathan, R.2    Baker, M.3
  • 7
    • 70449569012 scopus 로고    scopus 로고
    • Ensuring data storage security in cloud computing
    • Charleston, SC, Jul.
    • C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring Data Storage Security in Cloud Computing," in IEEE Workshop on QoS, Charleston, SC, Jul. 2009, pp. 1-9.
    • (2009) IEEE Workshop on QoS , pp. 1-9
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 9
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • Melbourne, Dec.
    • H. Shacham and B. Waters, "Compact Proofs of Retrievability," in Asiacrypt, Melbourne, Dec. 2008, pp. 90-107.
    • (2008) Asiacrypt , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 10
    • 74049103479 scopus 로고    scopus 로고
    • PORs: Proofs of retrievability for large files
    • Alexandria, VA, Oct.
    • [101 A. Juels and B. S. Kaliski, "PORs: Proofs of Retrievability for Large Files," in ACM CCS, Alexandria, VA, Oct. 2007, pp. 584-597.
    • (2007) ACM CCS , pp. 584-597
    • Juels, A.1    Kaliski, B.S.2
  • 11
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • San Diego
    • C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," in IEEE INFOCOM, San Diego, 2010.
    • (2010) IEEE INFOCOM
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 13
    • 74049136395 scopus 로고    scopus 로고
    • Proofs of retrievability: Theory and implementation
    • Chicago, IL, Nov.
    • K. D. Bowers, A. Juels, and A. Oprea, "Proofs of Retrievability: Theory and Implementation," in ACM CCSW, Chicago, IL, Nov. 2009, pp. 43-54.
    • (2009) ACM CCSW , pp. 43-54
    • Bowers, K.D.1    Juels, A.2    Oprea, A.3
  • 14
    • 74049121230 scopus 로고    scopus 로고
    • Dynamic provable data possession
    • Chicago, IL, Nov.
    • C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, "Dynamic Provable Data Possession," in ACM CCS, Chicago, IL, Nov. 2009, pp. 213-222.
    • (2009) ACM CCS , pp. 213-222
    • Erway, C.1    Kupcu, A.2    Papamanthou, C.3    Tamassia, R.4
  • 15
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing
    • Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing," in ESORICS, 2009.
    • (2009) ESORICS
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 16
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing," in IEEE INFOCOM, 2010.
    • (2010) IEEE INFOCOM
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 17
    • 84861957968 scopus 로고    scopus 로고
    • Towards secure and dependable storage services in cloud computing
    • C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, "Towards Secure and Dependable Storage Services in Cloud Computing," (to appear) IEEE Tran. Ser. Comp., 2011.
    • (2011) IEEE Tran. Ser. Comp.
    • Wang, C.1    Wang, Q.2    Ren, K.3    Cao, N.4    Lou, W.5
  • 18
    • 78650081896 scopus 로고    scopus 로고
    • Remote data checking for network coding-based distributed storage systems
    • Oct.
    • B. Chen, R. Curtmola, G. Ateniese, and R. Burns, "Remote Data Checking for Network Coding-based Distributed Storage Systems," in ACM CCSW, Oct. 2010, pp. 31-42.
    • (2010) ACM CCSW , pp. 31-42
    • Chen, B.1    Curtmola, R.2    Ateniese, G.3    Burns, R.4
  • 19
    • 77955682500 scopus 로고    scopus 로고
    • Security in distributed storage systems by communicating a logarithmic number of bits
    • Austin, TX, Jun.
    • T. K. Dikaliotis, A. G. Dimakis, and T. Ho, "Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits," in IEEE ISIT, Austin, TX, Jun. 2010, pp. 1948-1952.
    • (2010) IEEE ISIT , pp. 1948-1952
    • Dikaliotis, T.K.1    Dimakis, A.G.2    Ho, T.3
  • 20
    • 84866682636 scopus 로고    scopus 로고
    • Cooperative defense against pollution attacks in network coding using spacemac
    • to appear
    • A. Le and A. Markopoulou, "Cooperative Defense Against Pollution Attacks in Network Coding Using SpaceMac," (to appear) IEEE JSAC, 2011.
    • (2011) IEEE JSAC
    • Le, A.1    Markopoulou, A.2
  • 21
    • 85077127142 scopus 로고    scopus 로고
    • NCCloud: Applying network coding for the storage repair in a cloud-of-clouds
    • San Jose, CA, Feb.
    • Y Hu, H. C. H. Chen, P. P. C. Lee, and Y Tang, "NCCloud: Applying Network Coding for the Storage Repair in a Cloud-of-Clouds," in USENIX FAST, San Jose, CA, Feb. 2012, pp. 265-272.
    • (2012) USENIX FAST , pp. 265-272
    • Hu, Y.1    Chen, H.C.H.2    Lee, P.P.C.3    Tang, Y.4
  • 22
  • 23
    • 77955667642 scopus 로고    scopus 로고
    • On secure distributed data storage under repair dynamics
    • Austin, TX, Jun.
    • S. Pawar, S. E. Rouayheb, and K. Ramchandran, "On Secure Distributed Data Storage Under Repair Dynamics," in IEEE ISIT, Austin, TX, Jun. 2010, pp. 2543-2547.
    • (2010) IEEE ISIT , pp. 2543-2547
    • Pawar, S.1    Rouayheb, S.E.2    Ramchandran, K.3
  • 24
    • 77955685770 scopus 로고    scopus 로고
    • Secure distributive storage of decentralized source data: Can interaction help?
    • Austin, TX, Jun.
    • S. E. Rouayheb, V. Prabhakaran, and K. Ramchandran, "Secure Distributive Storage of Decentralized Source Data: Can Interaction Help?" in IEEE ISIT, Austin, TX, Jun. 2010, pp. 1953-1957.
    • (2010) IEEE ISIT , pp. 1953-1957
    • Rouayheb, S.E.1    Prabhakaran, V.2    Ramchandran, K.3
  • 25
    • 80054812722 scopus 로고    scopus 로고
    • Securing dynamic distributed storage systems from malicious nodes
    • Saint Petersburg, Jul.
    • S. Pawar, S. E. Rouayheb, and K. Ramchandran, "Securing Dynamic Distributed Storage Systems from Malicious Nodes," in IEEE ISIT, Saint Petersburg, Jul. 2011, pp. 1452-1456.
    • (2011) IEEE ISIT , pp. 1452-1456
    • Pawar, S.1    Rouayheb, S.E.2    Ramchandran, K.3
  • 26
    • 80053951920 scopus 로고    scopus 로고
    • Securing dynamic distributed storage systems against eavesdropping and adversarial attacks
    • Sep.
    • -, "Securing Dynamic Distributed Storage Systems against Eavesdropping and Adversarial Attacks," Tran. Info. Theory, vol. 57, no. 9, pp. 1-19, Sep. 2011.
    • (2011) Tran. Info. Theory , vol.57 , Issue.9 , pp. 1-19
    • Pawar, S.1    Rouayheb, S.E.2    Ramchandran, K.3
  • 28
    • 80053034503 scopus 로고    scopus 로고
    • TESLA-Based defense against pollution attacks in P2P systems with network coding
    • Beijing, Jul.
    • A. Le and A. Markopoulou, "TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding," in IEEE NetCod, Beijing, Jul. 2011, pp. 1-7.
    • (2011) IEEE NetCod , pp. 1-7
    • Le, A.1    Markopoulou, A.2
  • 29
    • 77955674519 scopus 로고    scopus 로고
    • Locating byzantine attackers in intra-session network coding using spacemac
    • Toronto, Jun.
    • -, "Locating Byzantine Attackers in Intra-Session Network Coding using SpaceMac," in IEEE NetCod, Toronto, Jun. 2010, pp. 1-6.
    • (2010) IEEE NetCod , pp. 1-6
    • Le, A.1    Markopoulou, A.2
  • 30
    • 84861595495 scopus 로고    scopus 로고
    • On detecting pollution attacks in inter-session network coding
    • Orlando, FL, Mar.
    • -, "On Detecting Pollution Attacks in Inter-Session Network Coding," in IEEE INFOCOM, Orlando, FL, Mar. 2012, pp. 343-351.
    • (2012) IEEE INFOCOM , pp. 343-351
    • Le, A.1    Markopoulou, A.2
  • 31
    • 84866682637 scopus 로고    scopus 로고
    • NC-audit: Auditing for network coding storage
    • Online. Available
    • -, "NC-Audit: Auditing for Network Coding Storage," Technical Report. [Online]. Available: http://arxiv.org/abs/1203.1730
    • Technical Report
    • Le, A.1    Markopoulou, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.