메뉴 건너뛰기




Volumn 39, Issue 7, 2013, Pages 2413-2424

Data dynamics for remote data possession checking in cloud storage

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD STORAGES; DATA DYNAMICS; DATA OPERATIONS; INTEGRITY PROTECTION; MERKLE HASH TREE; PROVABLE DATA POSSESSIONS; SECURITY AND PERFORMANCE; STORAGE SERVERS;

EID: 84885662348     PISSN: 00457906     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.compeleceng.2013.07.010     Document Type: Article
Times cited : (33)

References (31)
  • 1
    • 84874108116 scopus 로고    scopus 로고
    • Beyond lightning: A survey on security challenges in cloud computing
    • C. Rong, S.T. Nguyen, and M.G. Jaatun Beyond lightning: a survey on security challenges in cloud computing Comput Electr Eng 39 1 2013 47 54
    • (2013) Comput Electr Eng , vol.39 , Issue.1 , pp. 47-54
    • Rong, C.1    Nguyen, S.T.2    Jaatun, M.G.3
  • 2
    • 84866362425 scopus 로고    scopus 로고
    • A framework for establishing trust in the cloud
    • Imad M. Abbadi, and Muntaha Abbadi A framework for establishing trust in the cloud Comput Electr Eng 38 5 2012 1073 1087
    • (2012) Comput Electr Eng , vol.38 , Issue.5 , pp. 1073-1087
    • Abbadi, I.M.1    Abbadi, M.2
  • 3
    • 3543050732 scopus 로고    scopus 로고
    • On-the-fly verification of rateless erasure codes for efficient content distribution
    • Krohn MN, Freedman MJ, and Mazieres D. On-the-fly verification of rateless erasure codes for efficient content distribution. In: Proc of SP'04; 2004. p. 226-40.
    • (2004) Proc of SP'04 , pp. 226-240
    • Krohn, M.N.1    Freedman, M.J.2    Mazieres, D.3
  • 4
    • 79953294892 scopus 로고    scopus 로고
    • Enabling public auditability and data dynamics for storage security in cloud computing
    • Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li Enabling public auditability and data dynamics for storage security in cloud computing IEEE Trans Parallel Distrib Syst 22 5 2011 847 859
    • (2011) IEEE Trans Parallel Distrib Syst , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Ren, K.3    Lou, W.4    Li, J.5
  • 7
    • 72449185582 scopus 로고    scopus 로고
    • Proofs of storage from homomorphic identification protocols
    • Ateniese G, Kamara S, Katz J. Proofs of storage from homomorphic identification protocols. In: Proc of ASIACRYPT '09; 2009. p. 319-33.
    • (2009) Proc of ASIACRYPT '09 , pp. 319-333
    • Ateniese, G.1    Kamara, S.2    Katz, J.3
  • 10
    • 80053975961 scopus 로고    scopus 로고
    • A homomorphic hashing based provable data possession
    • Lanxiang. Chen A homomorphic hashing based provable data possession J Electr Inform Technol 33 9 2011 2199 2204
    • (2011) J Electr Inform Technol , vol.33 , Issue.9 , pp. 2199-2204
    • Lanxiang, C.1
  • 11
    • 84894098673 scopus 로고    scopus 로고
    • A hill cipher-based remote data possession checking in cloud storage
    • doi:10.1002/sec.746 doi
    • Chen Lanxiang, Guo Gongde, Peng Zhen. A hill cipher-based remote data possession checking in cloud storage. Secur Commun Networks. doi: http://dx.doi.org/10.1002/sec.746.
    • Secur Commun Networks
    • Lanxiang, C.1    Gongde, G.2    Zhen, P.3
  • 15
    • 79960900327 scopus 로고    scopus 로고
    • A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
    • Z. Hao, S. Zhong, and N. Yu A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability IEEE Trans Knowl Data Eng 23 9 2011 1432 1437
    • (2011) IEEE Trans Knowl Data Eng , vol.23 , Issue.9 , pp. 1432-1437
    • Hao, Z.1    Zhong, S.2    Yu, N.3
  • 16
    • 74049103479 scopus 로고    scopus 로고
    • Pors: Proofs of retrievability for large files
    • Juels A, Kaliski BS. Pors: proofs of retrievability for large files. In: Proc of ACM-CCS '07; 2007. p. 584-97.
    • (2007) Proc of ACM-CCS '07 , pp. 584-597
    • Juels, A.1    Kaliski, B.S.2
  • 18
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • D. Boneh, B. Lynn, and H. Shacham Short signatures from the Weil pairing J Cryptology 17 4 2004 297 319
    • (2004) J Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 19
    • 70350681128 scopus 로고    scopus 로고
    • Proofs of retrievability via hardness amplification
    • Dodis Y, Vadhan S, Wichs D. Proofs of retrievability via hardness amplification. In: Proc of TCC '09; 2009. p. 109-27.
    • (2009) Proc of TCC '09 , pp. 109-127
    • Dodis, Y.1    Vadhan, S.2    Wichs, D.3
  • 21
    • 33947694320 scopus 로고    scopus 로고
    • Store, forget, and check: Using algebraic signatures to check remotely administered storage
    • Schwarz TJE, Miller EL. Store, forget, and check: Using algebraic signatures to check remotely administered storage. In: Proc of ICDCS '06; 2006. p. 12.
    • (2006) Proc of ICDCS '06 , pp. 12
    • Tje, S.1    Miller, E.L.2
  • 22
    • 84885645897 scopus 로고    scopus 로고
    • Using algebraic signatures to check data possession in cloud storage
    • Lanxiang Chen Using algebraic signatures to check data possession in cloud storage Future Gene Comput Syst 29 7 2013 1709 1715
    • (2013) Future Gene Comput Syst , vol.29 , Issue.7 , pp. 1709-1715
    • Chen, L.1
  • 23
    • 74049144464 scopus 로고    scopus 로고
    • HAIL: A high-availability and integrity layer for cloud storage
    • Bowers KD, Juels A, Oprea A. HAIL: a high-availability and integrity layer for cloud storage. In: Proc of ACM-CCS '09; 2009. p. 187-98.
    • (2009) Proc of ACM-CCS '09 , pp. 187-198
    • Bowers, K.D.1    Juels, A.2    Oprea, A.3
  • 24
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • Wang C, Wang Q, Ren K, Lou W. Privacy-preserving public auditing for data storage security in cloud computing. In: Proc of INFOCOM; 2010. p. 525-33.
    • (2010) Proc of INFOCOM , pp. 525-533
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 25
    • 84861959172 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for secure cloud storage
    • C. Wang, S. Chow, Q. Wang, K. Ren, and W. Lou Privacy-preserving public auditing for secure cloud storage IEEE Trans Comput 62 2 2013 362 375
    • (2013) IEEE Trans Comput , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 27
    • 0000845043 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Pedersen TP. Non-interactive and information-theoretic secure verifiable secret sharing. In: Proc of CRYPTO '91; 1991. p. 129-40.
    • (1991) Proc of CRYPTO '91 , pp. 129-140
    • Pedersen, T.P.1
  • 28
    • 0346528350 scopus 로고
    • Cryptographically strong undeniable signatures, unconditionally secure for the signer
    • Chaum D, Heijst E, Pfitzmann B. Cryptographically strong undeniable signatures, unconditionally secure for the signer. In: Proc of CRYPTO '91; 1991. p. 470-84.
    • (1991) Proc of CRYPTO '91 , pp. 470-484
    • Chaum, D.1    Heijst, E.2    Pfitzmann, B.3
  • 29
    • 84920380941 scopus 로고
    • Protocols for public key cryptosystems
    • Merkle RC. Protocols for public key cryptosystems. In: Proc of SP'80; 1980. p. 122-33.
    • (1980) Proc of SP'80 , pp. 122-133
    • Merkle, R.C.1
  • 30
    • 84885578699 scopus 로고    scopus 로고
    • National Institute of Standards and Technology. Digital signature standard (DSS); Federal information processing standards publication 186-2, US dept of commerce/NIST; 2000
    • National Institute of Standards and Technology. Digital signature standard (DSS); Federal information processing standards publication 186-2, US dept of commerce/NIST; 2000.
  • 31
    • 85024585723 scopus 로고
    • Cremental cryptography: The case of hashing and signing
    • Bellare M, Goldreich O, Goldwasser S. In:cremental cryptography: the case of hashing and signing. In: Proc of CRYPTO '94; 1994. p. 216-33.
    • (1994) Proc of CRYPTO '94 , pp. 216-233
    • Bellare, M.1    Goldreich, O.2    Goldwasser, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.