메뉴 건너뛰기




Volumn 6, Issue 4, 2013, Pages 551-559

Proxy provable data possession in public clouds

Author keywords

bilinear pairings; Cloud computing; integrity checking; PPDP; provable security

Indexed keywords

BILINEAR PAIRING; BUSINESS ENVIRONMENTS; DATA CONFIDENTIALITY; INTEGRITY CHECKING; PERFORMANCE ANALYSIS; PPDP; PROVABLE DATA POSSESSIONS; PROVABLE SECURITY;

EID: 84890471117     PISSN: 19391374     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSC.2012.35     Document Type: Article
Times cited : (201)

References (29)
  • 6
    • 84869466694 scopus 로고    scopus 로고
    • Cooperative provable data possession for integrity verification in multi-cloud storage
    • Dec.
    • Y. Zhu, H. Hu, G.J. Ahn, and M. Yu, "Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage," IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231-2244, Dec. 2012.
    • (2012) IEEE Trans. Parallel and Distributed Systems , vol.23 , Issue.12 , pp. 2231-2244
    • Zhu, Y.1    Hu, H.2    Ahn, G.J.3    Yu, M.4
  • 8
    • 84863642638 scopus 로고    scopus 로고
    • Provable possession and replication of data over cloud servers
    • CACR, Univ. of Waterloo
    • A.F. Barsoum and M.A. Hasan, "Provable Possession and Replication of Data over Cloud Servers," Technical Report 2010/32,2010, CACR, Univ. of Waterloo, http://www.cacr.math. uwaterloo.ca/techreports/2010/cacr2010-32.pdf, 2013.
    • (2013) Technical Report 2010/32,2010
    • Barsoum, A.F.1    Hasan, M.A.2
  • 11
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," Proc. IEEE INFOCOM, pp. 525-533, 2010.
    • (2010) Proc. IEEE INFOCOM , pp. 525-533
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 13
    • 79953294892 scopus 로고    scopus 로고
    • Enabling public auditability and data dynamics for storage security in cloud computing
    • May
    • Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.
    • (2011) IEEE Trans. Parallel and Distributed Systems , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Ren, K.3    Lou, W.4    Li, J.5
  • 21
    • 0242410360 scopus 로고    scopus 로고
    • A practical (t, n) threshold proxy signature scheme based on the rsa cryptosystem
    • Nov./Dec.
    • M. Hwang, J. Lu, and E. Lin, "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem," IEEE Trans. Knowledge and Data Eng., vol. 15, no. 6, pp. 1552-1560, Nov./Dec. 2003.
    • (2003) IEEE Trans. Knowledge and Data Eng. , vol.15 , Issue.6 , pp. 1552-1560
    • Hwang, M.1    Lu, J.2    Lin, E.3
  • 22
    • 79951935674 scopus 로고    scopus 로고
    • Unidirectional chosen-ciphertext secure proxy re-encryption
    • Mar.
    • B. Libert and D. Vergnaud, "Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption," IEEE Trans. Information Theory, vol. 57, no. 3, pp. 1786-1802, Mar. 2011.
    • (2011) IEEE Trans. Information Theory , vol.57 , Issue.3 , pp. 1786-1802
    • Libert, B.1    Vergnaud, D.2
  • 23
    • 53149090186 scopus 로고    scopus 로고
    • Proxy-based wireless data access algorithms in mobile hotspots
    • Sept.
    • S. Pack, H. Rutagemwa, X. Shen, J. Mark, and K. Park, "Proxy-Based Wireless Data Access Algorithms in Mobile Hotspots," IEEE Trans. Vehicular Technology, vol. 57, no. 5, pp. 3165-3177, Sept. 2008.
    • (2008) IEEE Trans. Vehicular Technology , vol.57 , Issue.5 , pp. 3165-3177
    • Pack, S.1    Rutagemwa, H.2    Shen, X.3    Mark, J.4    Park, K.5
  • 24
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based encryption from the weil pairing
    • Advances in Cryptology - CRYPTO 2001
    • D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing," Proc. 21st Ann. Int'l Cryptology Conf. (CRYPTO '01), pp. 213-229, 2001. (Pubitemid 33317917)
    • (2001) Lecture notes in computer science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 26
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • Advances in Cryptology - ASIACRYPT 2001
    • D. Boneh, B. Lynn, and H. Shacham, "Short Signatures from the Weil Pairing," Proc. Seventh Int'l Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT '01), pp. 514-532, 2001. (Pubitemid 33371204)
    • (2002) Lecture notes in computer science , Issue.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 29
    • 0005340397 scopus 로고
    • Responses to NISTs proposal
    • S. Vanstone, "Responses to NISTs Proposal," Comm. ACM, vol. 35, pp. 50-52, 1992.
    • (1992) Comm. ACM , vol.35 , pp. 50-52
    • Vanstone, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.