메뉴 건너뛰기




Volumn 50 LNICST, Issue , 2010, Pages 380-397

FADE: Secure overlay cloud storage with file assured deletion

Author keywords

Cloud storage; Policy based file assured deletion; Prototype implementation

Indexed keywords

CRYPTOGRAPHIC TECHNIQUES; CURRENT DATA; DATA BACKUPS; DATA FILES; FILE ACCESS; OUTSOURCE; OVERLAY SYSTEMS; POLICY-BASED FILE ASSURED DELETION; PROTOTYPE IMPLEMENTATIONS; SECURE OVERLAY; SECURITY FEATURES; STORAGE SERVICES; STORAGE SYSTEMS;

EID: 84885890734     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-16161-2_22     Document Type: Conference Paper
Times cited : (117)

References (24)
  • 2
    • 84885892174 scopus 로고    scopus 로고
    • Amazon Simple Storage Service (Amazon S3), http://aws.amazon.com/s3/
  • 6
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for FineGrained access control of encrypted data
    • Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-Based Encryption for FineGrained Access Control of Encrypted Data. In: Proc. of ACM CCS (2006)
    • (2006) Proc. of ACM CCS
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 7
    • 84885885070 scopus 로고    scopus 로고
    • JungleDisk, http://www.jungledisk.com/
  • 9
    • 84885891374 scopus 로고    scopus 로고
    • LibAWS++, http://aws.28msec.com/
    • LibAWS++
  • 11
    • 84885888244 scopus 로고    scopus 로고
    • MyAsiaCloud, http://www.myasiacloud.com/
  • 13
    • 84885886826 scopus 로고    scopus 로고
    • OpenSSL, http://www.openssl.org/
  • 14
    • 84866604596 scopus 로고    scopus 로고
    • File system design with assured delete
    • Perlman, R.: File System Design with Assured Delete. In: ISOC NDSS (2007)
    • (2007) ISOC NDSS
    • Perlman, R.1
  • 17
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005) (Pubitemid 41313969)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 18
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A.: How to Share a Secret. CACM 22(11), 612-613 (1979)
    • (1979) CACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 19
    • 84885890208 scopus 로고    scopus 로고
    • SmugMug, http://www.smugmug.com/
  • 22
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for storage security in cloud computing
    • March
    • Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for storage security in cloud computing. In: Proc. of IEEE INFOCOM (March 2010)
    • (2010) Proc. of IEEE INFOCOM
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 24
    • 74049138993 scopus 로고    scopus 로고
    • On protecting integrity and confidentiality of cryptographic file system for outsourced storage
    • November
    • Yun, A., Shi, C., Kim, Y.: On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage. In: ACM Cloud Computing Security Workshop (CCSW) (November 2009)
    • (2009) ACM Cloud Computing Security Workshop (CCSW)
    • Yun, A.1    Shi, C.2    Kim, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.