메뉴 건너뛰기




Volumn , Issue , 2012, Pages 85-91

Survey on cloud data integrity proof techniques

Author keywords

cloud computing; data integrity; data owner auditing; proof of retrievability; provable data possession; third party auditing

Indexed keywords

DATA INTEGRITY; DATA OWNER AUDITING; PROOF OF RETRIEVABILITY; PROVABLE DATA POSSESSION; THIRD PARTIES;

EID: 84868244288     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AsiaJCIS.2012.22     Document Type: Conference Paper
Times cited : (9)

References (26)
  • 1
    • 84861307113 scopus 로고    scopus 로고
    • The NIST definition of cloud computing (draft)
    • P. Mell and T. Grance, "The NIST definition of cloud computing (draft)," NIST special publication, vol. 800, p. 145, 2011.
    • (2011) NIST Special Publication , vol.800 , pp. 145
    • Mell, P.1    Grance, T.2
  • 2
    • 84868221156 scopus 로고    scopus 로고
    • What is cloud computing?, Data security and privacy, Identity and access management
    • ed Beijing Cambridge Farnham Köln Sebastopol • Taipei • Tokyo: O'Relly, September
    • T. Mather, et al., "what is cloud computing?, Data security and privacy, Identity and access management," in Cloud security and privacy, ed Beijing Cambridge Farnham Köln Sebastopol • Taipei • Tokyo: O'Relly, September 2009, pp. 7-34, 61-98.
    • (2009) Cloud Security and Privacy
    • Mather, T.1
  • 8
    • 77954843911 scopus 로고    scopus 로고
    • Toward publicly auditable secure cloud data storage services
    • W. Cong, et al., "Toward publicly auditable secure cloud data storage services," Network, IEEE, vol. 24, pp. 19-24, 2010.
    • (2010) Network, IEEE , vol.24 , pp. 19-24
    • Cong, W.1
  • 11
    • 41549146158 scopus 로고    scopus 로고
    • Master's Thesis, Technische Universiteit Eindhoven
    • M. Maas, "Pairing-based cryptography," Master's Thesis, Technische Universiteit Eindhoven, 2004.
    • (2004) Pairing-based Cryptography
    • Maas, M.1
  • 13
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
    • W. Cong, et al., "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," in INFOCOM, 2010 Proceedings IEEE, 2010, pp. 1-9.
    • INFOCOM, 2010 Proceedings IEEE, 2010 , pp. 1-9
    • Cong, W.1
  • 16
    • 79959823910 scopus 로고    scopus 로고
    • Remote data checking using provable data possession
    • G. Ateniese, et al., "Remote data checking using provable data possession," ACM Trans. Inf. Syst. Secur., vol. 14, pp. 1-34, 2011.
    • (2011) ACM Trans. Inf. Syst. Secur. , vol.14 , pp. 1-34
    • Ateniese, G.1
  • 20
    • 33747176236 scopus 로고    scopus 로고
    • Authentication and integrity in outsourced databases
    • E. Mykletun, et al., "Authentication and integrity in outsourced databases," Trans. Storage, vol. 2, pp. 107-138, 2006.
    • (2006) Trans. Storage , vol.2 , pp. 107-138
    • Mykletun, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.