메뉴 건너뛰기




Volumn , Issue , 2012, Pages 649-655

On cloud storage and the cloud of clouds approach

Author keywords

access privacy; Distributed cloud storage; information dispersal; security; state of the art; storage security

Indexed keywords

DISTRIBUTED CLOUDS; INFORMATION DISPERSAL; SECURITY; STATE OF THE ART; STORAGE SECURITY;

EID: 84876174911     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (40)

References (38)
  • 1
    • 67650346359 scopus 로고    scopus 로고
    • Tahoe: The least-authority filesystem
    • Z. Wilcox-O'Hearn and B. Warner, "Tahoe: the least-authority filesystem," in StorageSS, 2008, pp. 21-26.
    • (2008) StorageSS , pp. 21-26
    • Wilcox-O'Hearn, Z.1    Warner, B.2
  • 9
    • 85077023955 scopus 로고    scopus 로고
    • AONT-RS: Blending Security and Performance in Dispersed Storage Systems
    • J. K. Resch and J. S. Plank, "AONT-RS: Blending Security and Performance in Dispersed Storage Systems," in FAST, 2011, pp. 191-202.
    • (2011) FAST , pp. 191-202
    • Resch, J.K.1    Plank, J.S.2
  • 10
    • 84856343948 scopus 로고    scopus 로고
    • Information Dispersion over Redundant Arrays of Optimal Cloud Storage for Desktop Users
    • J. Spillner, G. Bombach, S. Matthischke, J. Muller, R. Tzschichholz, and A. Schill, "Information Dispersion over Redundant Arrays of Optimal Cloud Storage for Desktop Users," in UCC, 2011, pp. 1-8.
    • (2011) UCC , pp. 1-8
    • Spillner, J.1    Bombach, G.2    Matthischke, S.3    Muller, J.4    Tzschichholz, R.5    Schill, A.6
  • 12
    • 84876187832 scopus 로고    scopus 로고
    • Nov. 20
    • Amazon Outage, http://www.networkworld.com/news/2012/042712-amazon- outage-258735.htmll, Nov. 20. 2012.
    • (2012) Amazon Outage
  • 13
    • 84876185361 scopus 로고    scopus 로고
    • Nov. 20
    • Sidekick, http://abcnews.go.com/Business/sidekick-disaster-shows-datas- safe-cloud/story?id=8840420, Nov. 20. 2012.
    • (2012) Sidekick
  • 14
    • 84957626176 scopus 로고
    • Proactive Secret Sharing Or: How to Cope with Perpetual Leakage
    • A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive Secret Sharing Or: How to Cope With Perpetual Leakage," in CRYPTO, 1995, pp. 339-352.
    • (1995) CRYPTO , pp. 339-352
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 15
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 16
    • 0023538330 scopus 로고
    • A Practical Scheme for Non-interactive Verifiable Secret Sharing
    • P. Feldman, "A Practical Scheme for Non-interactive Verifiable Secret Sharing," in FOCS, 1987, pp. 427-437.
    • (1987) FOCS , pp. 427-437
    • Feldman, P.1
  • 17
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing, and fault tolerance
    • M. O. Rabin, "Efficient dispersal of information for security, load balancing, and fault tolerance," J. ACM, vol. 36, no. 2, pp. 335-348, 1989.
    • (1989) J. ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.O.1
  • 18
    • 85028775022 scopus 로고
    • Secret sharing made short
    • H. Krawczyk, "Secret sharing made short," in CRYPTO, 1993, pp. 136-146.
    • (1993) CRYPTO , pp. 136-146
    • Krawczyk, H.1
  • 20
    • 84947912552 scopus 로고    scopus 로고
    • All-or-Nothing Encryption and the Package Transform
    • R. L. Rivest, "All-or-Nothing Encryption and the Package Transform," in Fast Software Encryption (FSE '97), 1997, pp. 210-218.
    • (1997) Fast Software Encryption (FSE '97) , pp. 210-218
    • Rivest, R.L.1
  • 27
    • 84857773390 scopus 로고    scopus 로고
    • Efficient Schemes for Anonymous yet Authorized and Bounded Use of Cloud Resources
    • in Selected Areas in Cryptography (SAC 2011), ser.
    • D. Slamanig, "Efficient Schemes for Anonymous yet Authorized and Bounded Use of Cloud Resources," in Selected Areas in Cryptography (SAC 2011), ser. LNCS, vol. 7118, 2011, pp. 73-91.
    • (2011) LNCS , vol.7118 , pp. 73-91
    • Slamanig, D.1
  • 28
    • 84865500708 scopus 로고    scopus 로고
    • (More) Side Channels in Cloud Storage: Linking Data to Users
    • in Privacy and Identity Management for Life, ser.
    • T. Pulls, "(More) Side Channels in Cloud Storage: Linking Data to Users," in Privacy and Identity Management for Life, ser. AICT, vol. 375, 2012, pp. 102-115.
    • (2012) AICT , vol.375 , pp. 102-115
    • Pulls, T.1
  • 29
    • 84868352690 scopus 로고    scopus 로고
    • Privacy-Friendly Cloud Storage for the Data Track: An Educational Transparency Tool
    • in 17th Nordic Conference on Secure IT Systems (NordSec 2012), ser.
    • -, "Privacy-Friendly Cloud Storage for the Data Track: An Educational Transparency Tool," in 17th Nordic Conference on Secure IT Systems (NordSec 2012), ser. LNCS, 2012.
    • (2012) LNCS
    • Pulls, T.1
  • 32
    • 84865805438 scopus 로고    scopus 로고
    • Privacy Enhanced Access Control for Outsourced Data Sharing
    • in Financial Cryptography and Data Security, ser. Springer
    • M. Raykova, H. Zhao, and S. Bellovin, "Privacy Enhanced Access Control for Outsourced Data Sharing," in Financial Cryptography and Data Security, ser. LNCS. Springer, 2012.
    • (2012) LNCS
    • Raykova, M.1    Zhao, H.2    Bellovin, S.3
  • 33
    • 84865830228 scopus 로고    scopus 로고
    • Dynamic Accumulator based Discretionary Access Control for Outsourced Storage with Unlinkable Access
    • in Financial Cryptography and Data Security, ser. Springer
    • D. Slamanig, "Dynamic Accumulator based Discretionary Access Control for Outsourced Storage with Unlinkable Access," in Financial Cryptography and Data Security, ser. LNCS. Springer, 2012.
    • (2012) LNCS
    • Slamanig, D.1
  • 35
    • 79952510570 scopus 로고    scopus 로고
    • Oblivious Transfer with Hidden Access Control Policies
    • in Public Key Cryptography, ser. Springer
    • J. Camenisch, M. Dubovitskaya, G. Neven, and G. M. Zaverucha, "Oblivious Transfer with Hidden Access Control Policies," in Public Key Cryptography, ser. LNCS, vol. 6571. Springer, 2011, pp. 192-209.
    • (2011) LNCS , vol.6571 , pp. 192-209
    • Camenisch, J.1    Dubovitskaya, M.2    Neven, G.3    Zaverucha, G.M.4
  • 36
    • 79959823641 scopus 로고    scopus 로고
    • Access Controls for Oblivious and Anonymous Systems
    • S. E. Coull, M. Green, and S. Hohenberger, "Access Controls for Oblivious and Anonymous Systems," ACM Trans. Inf. Syst. Secur., vol. 14, no. 1, p. 10, 2011.
    • (2011) ACM Trans. Inf. Syst. Secur. , vol.14 , Issue.1 , pp. 10
    • Coull, S.E.1    Green, M.2    Hohenberger, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.