메뉴 건너뛰기




Volumn 24, Issue 9, 2013, Pages 1717-1726

An efficient and secure dynamic auditing protocol for data storage in cloud computing

Author keywords

batch auditing; cloud computing; dynamic auditing; privacy preserving auditing; Storage auditing

Indexed keywords

ANALYSIS AND SIMULATION; BATCH AUDITING; CLOUD STORAGE SYSTEMS; COMPUTATION COSTS; INTEGRITY CHECKING; PRIVACY PRESERVING; RANDOM ORACLE MODEL; SECURITY CHALLENGES;

EID: 84881080693     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2012.278     Document Type: Article
Times cited : (578)

References (30)
  • 6
    • 33244454312 scopus 로고    scopus 로고
    • Securing distributed storage: Challenges, techniques, and systems
    • DOI 10.1145/1103780.1103783, StorageSS'05 - Proceedings of the 2005 ACM Workshop on Storage Security and Survivability
    • V. Kher and Y. Kim, "Securing Distributed Storage: Challenges, Techniques, and Systems," Proc. ACM Workshop Storage Security and Survivability (StorageSS), V. Atluri, P. Samarati, W. Yurcik, L. Brumbaugh, and Y. Zhou, eds., pp. 9-25, 2005. (Pubitemid 43275368)
    • (2005) StorageSS'05 - Proceedings of the 2005 ACM Workshop on Storage Security and Survivability , pp. 9-25
    • Kher, V.1    Kim, Y.2
  • 7
    • 36348936759 scopus 로고    scopus 로고
    • An analysis of latent sector errors in disk drives
    • DOI 10.1145/1269899.1254917, SIGMETRICS'07 - Proceedings of the 2007 International Conference on Measurement and Modeling of Computer Systems
    • L.N. Bairavasundaram, G.R. Goodson, S. Pasupathy, and J. Schindler, "An Analysis of Latent Sector Errors in Disk Drives," Proc. ACM SIGMETRICS Int'l Conf. Measurement and Modeling of Computer Systems, L. Golubchik, M.H. Ammar, and M. Harchol- Balter, eds., pp. 289-300, 2007. (Pubitemid 350158092)
    • (2007) Performance Evaluation Review , vol.35 , Issue.1 , pp. 289-300
    • Bairavasundaram, L.N.1    Goodson, G.R.2    Pasupathy, S.3    Schindler, J.4
  • 8
    • 85084160707 scopus 로고    scopus 로고
    • Disk Failures in the Real World: What Does an MTTF of 1,000,000 Hours Mean to You?"
    • B. Schroeder and G.A. Gibson, "Disk Failures in the Real World: What Does an MTTF of 1,000,000 Hours Mean to You?" Proc. USENIX Conf. File and Storage Technologies, pp. 1-16, 2007.
    • (2007) Proc. USENIX Conf. File and Storage Technologies , pp. 1-16
    • Schroeder, B.1    Gibson, G.A.2
  • 11
    • 60349120237 scopus 로고    scopus 로고
    • The complexity of online memory checking
    • article 2
    • M. Naor and G.N. Rothblum, "The Complexity of Online Memory Checking," J. ACM, vol. 56, no. 1, article 2, 2009.
    • (2009) J. ACM , vol.56 , Issue.1
    • Naor, M.1    Rothblum, G.N.2
  • 12
    • 74049103479 scopus 로고    scopus 로고
    • Pors: Proofs of retrievability for large files
    • P. Ning, S.D.C. di Vimercati, and P.F. Syverson, eds.
    • A. Juels and B.S. Kaliski Jr., "Pors: Proofs of Retrievability for Large Files," Proc. ACM Conf. Computer and Comm. Security, P. Ning, S.D.C. di Vimercati, and P.F. Syverson, eds., pp. 584-597, 2007.
    • (2007) Proc. ACM Conf. Computer and Comm. Security , pp. 584-597
    • Juels, A.1    Kaliski Jr., B.S.2
  • 14
    • 47849089563 scopus 로고    scopus 로고
    • Demonstrating data possession and uncheatable data transfer
    • D.L.G. Filho and P.S.L.M. Barreto, "Demonstrating Data Possession and Uncheatable Data Transfer," IACR Cryptology ePrint Archive, vol. 2006, p. 150, 2006.
    • (2006) IACR Cryptology EPrint Archive , vol.2006 , pp. 150
    • Filho, D.L.G.1    Barreto, P.S.L.M.2
  • 18
    • 77954843911 scopus 로고    scopus 로고
    • Toward publicly auditable secure cloud data storage services
    • July/Aug
    • C. Wang, K. Ren, W. Lou, and J. Li, "Toward Publicly Auditable Secure Cloud Data Storage Services," IEEE Network, vol. 24, no. 4, pp. 19-24, July/Aug. 2010.
    • (2010) IEEE Network , vol.24 , Issue.4 , pp. 19-24
    • Wang, C.1    Ren, K.2    Lou, W.3    Li, J.4
  • 19
    • 84858284080 scopus 로고    scopus 로고
    • Data storage auditing service in cloud computing: Challenges, methods and opportunities
    • K. Yang and X. Jia, "Data Storage Auditing Service in Cloud Computing: Challenges, Methods and Opportunities," World Wide Web, vol. 15, no. 4, pp. 409-428, 2012.
    • (2012) World Wide Web , vol.15 , Issue.4 , pp. 409-428
    • Yang, K.1    Jia, X.2
  • 23
    • 79953294892 scopus 로고    scopus 로고
    • Enabling public auditability and data dynamics for storage security in cloud computing
    • May
    • Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Trans. Parallel Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.
    • (2011) IEEE Trans. Parallel Distributed Systems , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Ren, K.3    Lou, W.4    Li, J.5
  • 24
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," Proc. IEEE INFOCOM, pp. 525-533, 2010.
    • (2010) Proc. IEEE INFOCOM , pp. 525-533
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 25
    • 84869466694 scopus 로고    scopus 로고
    • Cooperative provable data possession for integrity verification in multi-cloud storage
    • Dec
    • Y. Zhu, H. Hu, G. Ahn, and M. Yu, "Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage," IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231-2244, Dec. 2012.
    • (2012) IEEE Trans. Parallel and Distributed Systems , vol.23 , Issue.12 , pp. 2231-2244
    • Zhu, Y.1    Hu, H.2    Ahn, G.3    Yu, M.4
  • 26
    • 79959325063 scopus 로고    scopus 로고
    • Dynamic audit services for integrity verification of outsourced storages in clouds
    • W.C. Chu, W.E. Wong, M.J. Palakal, and C.-C. Hung, eds.
    • Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S.S. Yau, "Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds," Proc. ACM Symp. Applied Computing, W.C. Chu, W.E. Wong, M.J. Palakal, and C.-C. Hung, eds., pp. 1550-1557, 2011.
    • (2011) Proc. ACM Symp. Applied Computing , pp. 1550-1557
    • Zhu, Y.1    Wang, H.2    Hu, Z.3    Ahn, G.-J.4    Hu, H.5    Yau, S.S.6
  • 27
    • 57049170853 scopus 로고    scopus 로고
    • Publicly verifiable remote data integrity
    • L. Chen, M.D. Ryan, and G. Wang, eds., pp.
    • K. Zeng, "Publicly Verifiable Remote Data Integrity," Proc. 10th Int'l Conf. Information and Comm. Security, L. Chen, M.D. Ryan, and G. Wang, eds., pp. 419-434, 2008.
    • (2008) Proc. 10th Int'l Conf. Information and Comm. Security , pp. 419-434
    • Zeng, K.1
  • 30
    • 74049120601 scopus 로고    scopus 로고
    • Attribute-based encryption with non-monotonic access structures
    • P. Ning, S.D.C. di Vimercati, and P.F. Syverson, eds. Oct.
    • R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-Based Encryption with Non-Monotonic Access Structures," Proc. ACM Conf. Computer and Comm. Security (CCS '07), P. Ning, S.D.C. di Vimercati, and P.F. Syverson, eds., Oct. 2007.
    • (2007) Proc. ACM Conf. Computer and Comm. Security (CCS '07)
    • Ostrovsky, R.1    Sahai, A.2    Waters, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.