메뉴 건너뛰기




Volumn , Issue , 2013, Pages 101-111

Structural cloud audits that protect private information

Author keywords

cloud auditing; secure multi party computation

Indexed keywords

CLOUD STRUCTURE; CRITICAL TASKS; DATA PARTITIONING; PRIVACY PRESERVING; PRIVATE INFORMATION; PROTOTYPE IMPLEMENTATIONS; RELIABILITY GUARANTEE; SECURE MULTI-PARTY COMPUTATION;

EID: 84889073577     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2517488.2517493     Document Type: Conference Paper
Times cited : (11)

References (28)
  • 2
    • 84887107917 scopus 로고    scopus 로고
    • NetworkX. http://networkx.github.com/.
    • NetworkX
  • 3
    • 84864720397 scopus 로고    scopus 로고
    • Windows azure. http://en.wikipedia.org/wiki/Windows-Azure.
    • Windows Azure
  • 6
    • 84878402955 scopus 로고    scopus 로고
    • Pushing back the rain - How to create trustworthy services in the cloud
    • Available at
    • D. Bogdanov and A. Kalu. Pushing back the rain - how to create trustworthy services in the cloud. ISACA Journal, 3:49-51, 2013. Available at http://www.isaca.org/Journal/Past-Issues/2013/Volume-3/Pages/default.aspx.
    • (2013) ISACA Journal , vol.3 , pp. 49-51
    • Bogdanov, D.1    Kalu, A.2
  • 9
    • 84940970717 scopus 로고    scopus 로고
    • Available at
    • B. Butler. Top 10 cloud storage providers, 2013. Available at http://www.networkworld.com/news/2013/010313-gartner-cloud-storage-265459.html.
    • (2013) Top 10 Cloud Storage Providers
    • Butler, B.1
  • 10
    • 67049134126 scopus 로고    scopus 로고
    • Asynchronous multiparty computation: Theory and implementation
    • S. Jarecki and G. Tsudik, editors, Public Key Cryptography - PKC 2009, pages 160-179. Springer Verlag
    • I. Damgård, M. Geisler, M. Krøigård, and J. Nielsen. Asynchronous multiparty computation: Theory and implementation. In S. Jarecki and G. Tsudik, editors, Public Key Cryptography - PKC 2009, pages 160-179. Springer Verlag, LNCS 5443, 2009.
    • (2009) LNCS , vol.5443
    • Damgård, I.1    Geisler, M.2    Krøigård, M.3    Nielsen, J.4
  • 18
    • 58349083629 scopus 로고    scopus 로고
    • Privacy-preserving audit and extraction of digital contents
    • Report 2008/186, Available at
    • M. A. Shah, R. Swaminathan, and M. Baker. Privacy-preserving audit and extraction of digital contents. Cryptology ePrint Archive, Report 2008/186, 2008. Available at http://eprint.iacr.org/2008/186/.
    • (2008) Cryptology ePrint Archive
    • Shah, M.A.1    Swaminathan, R.2    Baker, M.3
  • 21
    • 77954843911 scopus 로고    scopus 로고
    • Toward publicly auditable secure cloud data storage services
    • C. Wang, K. Ren, W. Lou, and J. Li. Toward publicly auditable secure cloud data storage services. IEEE Network, 24(4):19-24, 2010.
    • (2010) IEEE Network , vol.24 , Issue.4 , pp. 19-24
    • Wang, C.1    Ren, K.2    Lou, W.3    Li, J.4
  • 22
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • C. Wang, Q. Wang, K. Ren, and W. Lou. Privacy-preserving public auditing for data storage security in cloud computing. In IEEE INFOCOM, pages 525-533, 2010.
    • (2010) IEEE INFOCOM , pp. 525-533
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 24
    • 84858284080 scopus 로고    scopus 로고
    • Data storage auditing service in cloud computing: Challenges, methods and opportunities
    • K. Yang and X. Jia. Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web, 15(4):409-428, 2012.
    • (2012) World Wide Web , vol.15 , Issue.4 , pp. 409-428
    • Yang, K.1    Jia, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.