메뉴 건너뛰기




Volumn , Issue , 2013, Pages 353-364

Multi-user dynamic proofs of data possession using trusted hardware

Author keywords

Cloud storage; Data outsourcing; Trusted hardware

Indexed keywords

CLOUD STORAGES; COMPUTATIONAL POWER; DATA AUTHENTICATION; DATA OUTSOURCING; PROVABLE DATA POSSESSIONS; STORAGE OUTSOURCINGS; TRUSTED COMPUTING TECHNOLOGY; TRUSTED HARDWARES;

EID: 84874832699     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2435349.2435400     Document Type: Conference Paper
Times cited : (25)

References (35)
  • 2
    • 84921018856 scopus 로고    scopus 로고
    • A practical and provably secure coalition resistant group signature scheme
    • G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition resistant group signature scheme. In CRYPTO, pages 255-270, 2000.
    • (2000) CRYPTO , pp. 255-270
    • Ateniese, G.1    Camenisch, J.2    Joye, M.3    Tsudik, G.4
  • 4
    • 74049144464 scopus 로고    scopus 로고
    • Hail: A high-availability and integrity layer for cloud storage
    • K. D. Bowers, A. Juels, and A. Oprea. Hail: a high-availability and integrity layer for cloud storage. In ACM CCS, pages 187-198, 2009.
    • (2009) ACM CCS , pp. 187-198
    • Bowers, K.D.1    Juels, A.2    Oprea, A.3
  • 5
    • 78751672541 scopus 로고    scopus 로고
    • Integrity and consistency for untrusted services
    • C. Cachin. Integrity and consistency for untrusted services. In SOFSEM, pages 1-14, 2011.
    • (2011) SOFSEM , pp. 1-14
    • Cachin, C.1
  • 6
    • 70449984096 scopus 로고    scopus 로고
    • Fail-aware untrusted storage
    • C. Cachin, I. Keidar, and A. Shraer. Fail-aware untrusted storage. In DSN, pages 494-503, 2009.
    • (2009) DSN , pp. 494-503
    • Cachin, C.1    Keidar, I.2    Shraer, A.3
  • 7
    • 59249102694 scopus 로고    scopus 로고
    • Attested append-only memory: Making adversaries stick to their word
    • B.-G. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz. Attested append-only memory: making adversaries stick to their word. In SOSP, pages 189-204, 2007.
    • (2007) SOSP , pp. 189-204
    • Chun, B.-G.1    Maniatis, P.2    Shenker, S.3    Kubiatowicz, J.4
  • 9
    • 84991960975 scopus 로고    scopus 로고
    • SPORC: Group collaboration using untrusted cloud resources
    • A. J. Feldman, W. P. Zeller, M. J. Freedman, and E. W. Felten. SPORC: Group collaboration using untrusted cloud resources. In OSDI, pages 337-350, 2010.
    • (2010) OSDI , pp. 337-350
    • Feldman, A.J.1    Zeller, W.P.2    Freedman, M.J.3    Felten, E.W.4
  • 13
    • 74049103479 scopus 로고    scopus 로고
    • PORs: Proofs of retrievability for large files
    • A. Juels and B. S. Kaliski, Jr. PORs: Proofs of retrievability for large files. In ACM CCS, pages 584-597, 2007.
    • (2007) ACM CCS , pp. 584-597
    • Juels, A.1    Kaliski Jr., B.S.2
  • 15
    • 85076877909 scopus 로고    scopus 로고
    • TrInc: Small trusted hardware for large distributed systems
    • D. Levin, J. R. Douceur, J. R. Lorch, and T. Moscibroda. TrInc: Small trusted hardware for large distributed systems. In NSDI, pages 1-14, 2009.
    • (2009) NSDI , pp. 1-14
    • Levin, D.1    Douceur, J.R.2    Lorch, J.R.3    Moscibroda, T.4
  • 16
    • 77952379905 scopus 로고    scopus 로고
    • Secure untrusted data repository (SUNDR)
    • J. Li, M. N. Krohn, D. Mazières, and D. Shasha. Secure untrusted data repository (SUNDR). In OSDI, pages 121-136, 2004.
    • (2004) OSDI , pp. 121-136
    • Li, J.1    Krohn, M.N.2    Mazières, D.3    Shasha, D.4
  • 17
    • 85094320125 scopus 로고    scopus 로고
    • Beyond one-third faulty replicas in Byzantine fault tolerant systems
    • J. Li and D. Mazières. Beyond one-third faulty replicas in Byzantine fault tolerant systems. In NSDI, 2007.
    • (2007) NSDI
    • Li, J.1    Mazières, D.2
  • 20
    • 0036953818 scopus 로고    scopus 로고
    • Building secure file systems out of Byzantine storage
    • D. Mazières and D. Shasha. Building secure file systems out of Byzantine storage. In ACM PODC, pages 108-117, 2002.
    • (2002) ACM PODC , pp. 108-117
    • Mazières, D.1    Shasha, D.2
  • 22
    • 55149108173 scopus 로고    scopus 로고
    • Flicker: An execution infrastructure for TCB minimization
    • J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An execution infrastructure for TCB minimization. In EuroSys, pages 315-328, 2008.
    • (2008) EuroSys , pp. 315-328
    • McCune, J.M.1    Parno, B.2    Perrig, A.3    Reiter, M.K.4    Isozaki, H.5
  • 23
    • 84958802026 scopus 로고
    • A digital signature based on a conventional encryption function
    • R. C. Merkle. A digital signature based on a conventional encryption function. In CRYPTO, pages 369-378, 1987.
    • (1987) CRYPTO , pp. 369-378
    • Merkle, R.C.1
  • 26
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • H. Shacham and B. Waters. Compact proofs of retrievability. In ASIACRYPT, pages 90-107, 2008.
    • (2008) ASIACRYPT , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 33
    • 79959547649 scopus 로고    scopus 로고
    • Proof of freshness: How to efficiently use an online single secure clock to secure shared untrusted memory
    • MIT
    • M. van Dijk, L. Sarmenta, C. O'Donnell, and S. Devadas. Proof of freshness: How to efficiently use an online single secure clock to secure shared untrusted memory. Technical Report CSG Memo 496, MIT, 2006.
    • (2006) Technical Report CSG Memo , vol.496
    • Van Dijk, M.1    Sarmenta, L.2    O'Donnell, C.3    Devadas, S.4
  • 34
    • 84884706447 scopus 로고    scopus 로고
    • Towards end-to-end secure content storage and delivery with public cloud
    • H. Xiong, X. Zhang, D. Yao, X. Wu, and Y. Wen. Towards end-to-end secure content storage and delivery with public cloud. In ACM CODASPY, pages 257-266, 2012.
    • (2012) ACM CODASPY , pp. 257-266
    • Xiong, H.1    Zhang, X.2    Yao, D.3    Wu, X.4    Wen, Y.5
  • 35
    • 79952791500 scopus 로고    scopus 로고
    • Fair and dynamic proofs of retrievability
    • Q. Zheng and S. Xu. Fair and dynamic proofs of retrievability. In ACM CODASPY, pages 237-248, 2011.
    • (2011) ACM CODASPY , pp. 237-248
    • Zheng, Q.1    Xu, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.