메뉴 건너뛰기




Volumn 96 LNICST, Issue , 2012, Pages 491-500

CloudSeal: End-to-end content protection in cloud-based storage and delivery services

Author keywords

Cloud computing; content delivery network; proxy based re encryption; secret sharing

Indexed keywords

ACCESS CONTROL POLICIES; CONTENT DELIVERY NETWORK; CONTENT DELIVERY SERVICES; CONTENT DISTRIBUTION; CONTENT PROTECTION; CONTENT SHARING; DATA STORAGE; K-OUT-OF-N; PROXY RE ENCRYPTIONS; RE-ENCRYPTION; REVOCATION MECHANISM; SECRET KEY; SECRET SHARING; SECURITY AND PRIVACY; SHARED SECRETS; STORAGE AND DELIVERY; STORAGE SERVICES;

EID: 84869598494     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-31909-9_30     Document Type: Conference Paper
Times cited : (20)

References (21)
  • 1
    • 77957950747 scopus 로고    scopus 로고
    • Cloud Computing, an IDC update (2010), http://www.slideshare.net/ JorFigOr/cloud-computing-2010-an-idc-update
    • (2010) Cloud Computing, An IDC Update
  • 2
    • 42549151431 scopus 로고    scopus 로고
    • Secure Content Distribution by Parallel Processing from Cooperative Intermediaries
    • Koglin, Y., Yao, D., Bertino, E.: Secure Content Distribution by Parallel Processing from Cooperative Intermediaries. IEEE Transactions on Parallel and Distributed Systems 19(5), 615-626 (2008)
    • (2008) IEEE Transactions on Parallel and Distributed Systems , vol.19 , Issue.5 , pp. 615-626
    • Koglin, Y.1    Yao, D.2    Bertino, E.3
  • 5
    • 84870716531 scopus 로고    scopus 로고
    • AWS Customer Agreement (2011), http://aws.amazon.com/agreement/
    • (2011)
  • 8
    • 33745218758 scopus 로고    scopus 로고
    • Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage
    • Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. ACM Trans. Inf. Syst. Secur. 9, 1-30 (2006)
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 9
    • 84944319284 scopus 로고    scopus 로고
    • Efficient Trace and Revoke Schemes
    • Frankel, Y. (ed.) FC 2000. Springer, Heidelberg
    • Naor, M., Pinkas, B.: Efficient Trace and Revoke Schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 1-20. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.1962 , pp. 1-20
    • Naor, M.1    Pinkas, B.2
  • 10
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 11
    • 84946840347 scopus 로고    scopus 로고
    • Short Signatures from the Weil Pairing
    • Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
    • Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514-532. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 12
    • 0018545449 scopus 로고
    • How to Share A Secret
    • November
    • Shamir, A.: How to Share A Secret. Commun. ACM 22 (November 1979)
    • (1979) Commun. ACM , vol.22
    • Shamir, A.1
  • 14
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
    • Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In: Proceedings of INFOCOM (2010)
    • Proceedings of INFOCOM (2010)
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 15
    • 77953310709 scopus 로고    scopus 로고
    • Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
    • Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. In: Proceedings of INFOCOM (2010)
    • Proceedings of INFOCOM (2010)
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 16
    • 84865815069 scopus 로고    scopus 로고
    • K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access
    • Rajarajan, M., et al. (eds.) SecureComm 2011. Springer, Heidelberg
    • Zarandioon, S., Yao, D., Ganapathy, V.: K2C: Cryptographic Cloud Storage With Lazy Revocation and Anonymous Access. In: Rajarajan, M., et al. (eds.) SecureComm 2011. LNICST, vol. 96, pp. 59-76. Springer, Heidelberg (2012)
    • (2012) LNICST , vol.96 , pp. 59-76
    • Zarandioon, S.1    Yao, D.2    Ganapathy, V.3
  • 19
    • 84957656774 scopus 로고    scopus 로고
    • MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences
    • Rizzo, L., Fdida, S. (eds.) NGC 1999. Springer, Heidelberg
    • Briscoe, B.: MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences. In: Rizzo, L., Fdida, S. (eds.) NGC 1999. LNCS, vol. 1736, pp. 301-320. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1736 , pp. 301-320
    • Briscoe, B.1
  • 21
    • 85180804257 scopus 로고    scopus 로고
    • Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems
    • Traynor, P., Butler, K.R.B., Enck, W., McDaniel, P.: Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. In: NDSS (2008)
    • (2008) NDSS
    • Traynor, P.1    Butler, K.R.B.2    Enck, W.3    McDaniel, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.