메뉴 건너뛰기




Volumn 24, Issue 12, 2013, Pages 2375-2385

Enabling dynamic data and indirect mutual trust for cloud computing storage systems

Author keywords

Access control; Dynamic environment; Mutual trust; Outsourcing data storage

Indexed keywords

CLOUD SERVICE PROVIDERS; COMPUTATION OVERHEADS; DYNAMIC ENVIRONMENTS; DYNAMIC OPERATIONS; IMPORTANT FEATURES; MUTUAL TRUST; OUTSOURCING DATA STORAGES; PROTOTYPE IMPLEMENTATIONS;

EID: 84887982439     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2012.337     Document Type: Article
Times cited : (93)

References (33)
  • 6
    • 84863642638 scopus 로고    scopus 로고
    • Provable possession and replication of data over cloud servers
    • Centre for Applied Cryptographic Research
    • A.F. Barsoum and M.A. Hasan, "Provable Possession and Replication of Data over Cloud Servers," Technical Report 2010/32, Centre for Applied Cryptographic Research, http://www.cacr.math.uwaterloo.ca/techreports/2010/ cacr2010-32.pdf. 2010.
    • (2010) Technical Report 2010/32
    • Barsoum, A.F.1    Hasan, M.A.2
  • 8
    • 84874296531 scopus 로고    scopus 로고
    • On verifying dynamic multiple data copies over cloud servers
    • Cryptology Eprint Archive
    • A.F. Barsoum and M.A. Hasan, "On Verifying Dynamic Multiple Data Copies over Cloud Servers," Technical Report 2011/447, Cryptology Eprint Archive, http://eprint.iacr.org/, 2011.
    • (2011) Technical Report 2011/447
    • Barsoum, A.F.1    Hasan, M.A.2
  • 17
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data," Proc. 13th ACM Conf. Computer Comm. Security (CCS '06), pp. 89-98, 2006. (Pubitemid 47131359)
    • (2006) Proceedings of the ACM Conference on Computer and Communications Security , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 18
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing," Proc. IEEE INFOCOM '10, pp. 534-542, 2010.
    • (2010) Proc. IEEE INFOCOM '10 , pp. 534-542
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 24
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • Advances in Cryptology - ASIACRYPT 2001
    • D. Boneh, B. Lynn, and H. Shacham, "Short Signatures from the Weil Pairing," Proc. Seventh Int'l Conf. Theory Application Cryptology Information Security, pp. 514-532, 2001. (Pubitemid 33371204)
    • (2002) Lecture Notes In Computer Science , Issue.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 26
    • 84887867618 scopus 로고    scopus 로고
    • Amazon Web Service
    • Amazon Web Service, http://aws.amazon.com/, 2013.
    • (2013)
  • 28
    • 47849089563 scopus 로고    scopus 로고
    • Demonstrating data possession and uncheatable data transfer
    • Cryptology ePrint Archive
    • D.L.G. Filho and P.S.L.M. Barreto, "Demonstrating Data Possession and Uncheatable Data Transfer," Technical Report 2006/150, Cryptology ePrint Archive, 2006.
    • (2006) Technical Report 2006/150
    • Filho, D.L.G.1    Barreto, P.S.L.M.2
  • 29
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • Advances in Cryptology - CRYPTO 2001
    • D. Naor, M. Naor, and J.B. Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers," Proc. 21st Annu. Int'l Cryptology Conf. Advances Cryptology, pp. 41-62, 2001. (Pubitemid 33317907)
    • (2001) Lecture Notes In Computer Science , Issue.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 30
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Advances in Cryptology - EUROCRYPT '98
    • M. Blaze, G. Bleumer, and M. Strauss, "Divertible Protocols and Atomic Proxy Cryptography," Proc. Eurocrypt, pp. 127-144, 1998. (Pubitemid 128081481)
    • (1998) Lecture Notes In Computer Science , Issue.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 32
    • 78649885971 scopus 로고    scopus 로고
    • Analysis of integrity vulnerabilities and a non-repudiation protocol for cloud data storage platforms
    • J. Feng, Y. Chen, W.-S. Ku, and P. Liu, "Analysis of Integrity Vulnerabilities and a Non-Repudiation Protocol for Cloud Data Storage Platforms," Proc. 39th Int'l Conf. Parallel Processing, pp. 251-258, 2010.
    • (2010) Proc. 39th Int'l Conf. Parallel Processing , pp. 251-258
    • Feng, J.1    Chen, Y.2    Ku, W.-S.3    Liu, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.