메뉴 건너뛰기




Volumn , Issue , 2012, Pages 257-266

Towards end-to-end secure content storage and delivery with public cloud

Author keywords

cloud computing; cloud storage; confidentiality; content distribution; proxy based re encryption; security

Indexed keywords

ACCESS CONTROL; CRYPTOGRAPHY; NETWORK SECURITY; WEB SERVICES;

EID: 84884706447     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2133601.2133633     Document Type: Conference Paper
Times cited : (49)

References (38)
  • 3
    • 85139959525 scopus 로고    scopus 로고
    • Netflix on Amazon's Cloud. http://www. Techflash. com/seattle/2010/05/netflix_on_amazon_cloud. html.
    • Netflix on Amazon's Cloud
  • 8
    • 33745218758 scopus 로고    scopus 로고
    • Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage
    • February
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. ACM Trans. Inf. Syst. Secur., 9: 1-30, February 2006.
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 10
    • 0012970453 scopus 로고    scopus 로고
    • Identity-based Encryption from the Weil Pairing
    • D. Boneh and M. K. Franklin. Identity-based Encryption from the Weil Pairing. In CRYPTO '01.
    • CRYPTO '01
    • Boneh, D.1    Franklin, M.K.2
  • 12
    • 0344908112 scopus 로고    scopus 로고
    • MARKS: Multicast Key Management using Arbitratily Revealed Key Sequences
    • B. Briscoe. MARKS: Multicast Key Management using Arbitratily Revealed Key Sequences. In Proceedings of NGC'99.
    • Proceedings of NGC'99
    • Briscoe, B.1
  • 13
    • 85139933620 scopus 로고    scopus 로고
    • Nark: Receiver-based Multicast Non-repudiation and Key Management
    • B. Briscoe. Nark: Receiver-based Multicast Non-repudiation and Key Management. In Proceedings of EC'99.
    • Proceedings of EC'99
    • Briscoe, B.1
  • 17
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based Encryption for Fine-grained Access Control of Encrypted Data
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data. In Proc. of ACM CCS, 2006.
    • (2006) Proc. of ACM CCS
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 26
    • 74049152260 scopus 로고    scopus 로고
    • Hey, You, Get Off of My cloud! Exploring Information Leakage in Third-Party Compute Clouds
    • T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, You, Get Off of My cloud! Exploring Information Leakage in Third-Party Compute Clouds. In Proceedings of CCS, 2009.
    • (2009) Proceedings of CCS
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 29
    • 0018545449 scopus 로고
    • How to Share a Secret
    • November
    • A. Shamir. How to Share A Secret. Commun. ACM, 22, November 1979.
    • (1979) Commun. ACM , vol.22
    • Shamir, A.1
  • 30
    • 85180804257 scopus 로고    scopus 로고
    • Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems
    • P. Traynor, K. R. B. Butler, W. Enck, and P. McDaniel. Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. In NDSS, 2008.
    • (2008) NDSS
    • Traynor, P.1    Butler, K.R.B.2    Enck, W.3    McDaniel, P.4
  • 32
    • 0033893174 scopus 로고    scopus 로고
    • Secure Group Communications Using Key Graphs
    • February
    • C. K. Wong, M. Gouda, and S. S. Lam. Secure Group Communications Using Key Graphs. IEEE/ACM Trans. Netw., 8, February 2000.
    • (2000) IEEE/ACM Trans. Netw. , vol.8
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3
  • 33
    • 85139937333 scopus 로고    scopus 로고
    • Cloudseal: End-to-End Content Protection in Cloud-based Storage and Delivery Services
    • H. Xiong, X. Zhang, W. Zhu, and D. Yao. Cloudseal: End-to-End Content Protection in Cloud-based Storage and Delivery Services. In Proceedings of Securecomm, 2011.
    • (2011) Proceedings of Securecomm
    • Xiong, H.1    Zhang, X.2    Zhu, W.3    Yao, D.4
  • 35
    • 77953310709 scopus 로고    scopus 로고
    • Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
    • S. Yu, C. Wang, K. Ren, and W. Lou. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. In INFOCOM'10.
    • INFOCOM'10
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 36
    • 85139975469 scopus 로고    scopus 로고
    • K2C: Cryptographic Cloud Storage With Lazy Revocation and Anonymous Access
    • S. Zarandioon, D. Yao, and V. Ganapathy. K2C: Cryptographic Cloud Storage With Lazy Revocation and Anonymous Access. In Proceedings of Securecomm, 2011.
    • (2011) Proceedings of Securecomm
    • Zarandioon, S.1    Yao, D.2    Ganapathy, V.3
  • 37
    • 80053516153 scopus 로고    scopus 로고
    • Enforcing role-based access control for secure data storage in the cloud
    • L. Zhou, V. Varadharajan, and M. Hitchens. Enforcing role-based access control for secure data storage in the cloud. The Computer Journal, 2011.
    • (2011) The Computer Journal
    • Zhou, L.1    Varadharajan, V.2    Hitchens, M.3
  • 38
    • 33846644358 scopus 로고    scopus 로고
    • Efficient Security Mechanisms for Overlay Multicast based Content Delivery
    • February
    • S. Zhu, C. Yao, D. Liu, S. Setia, and S. Jajodia. Efficient Security Mechanisms for Overlay Multicast based Content Delivery. Comput. Commun., 30: 793-806, February 2007.
    • (2007) Comput. Commun. , vol.30 , pp. 793-806
    • Zhu, S.1    Yao, C.2    Liu, D.3    Setia, S.4    Jajodia, S.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.