메뉴 건너뛰기




Volumn 7, Issue 3, 2014, Pages 511-518

A hill cipher-based remote data possession checking in cloud storage

Author keywords

Cloud storage; Proof of retrievability; Provable data possession; Remote data possession checking; Storage reliability; Storage security

Indexed keywords

COST EFFECTIVENESS; NETWORK SECURITY;

EID: 84894098673     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.746     Document Type: Article
Times cited : (4)

References (29)
  • 1
    • 84894035639 scopus 로고    scopus 로고
    • Remote integrity checking. In: Proc. of IICIS '03
    • Deswarte Y, Quisquater J J. Remote integrity checking. In: Proc. of IICIS '03, 2003, pp.1-11.
    • (2003) , pp. 1-11
    • Deswarte, Y.1    Quisquater, J.J.2
  • 2
    • 84894033008 scopus 로고    scopus 로고
    • Demonstrating data possession and uncheatable data transfer. IACR ePrint archive, Report 2006/150,
    • Filho D L G, Baretto P S L M. Demonstrating data possession and uncheatable data transfer. IACR ePrint archive, 2006. Report 2006/150, http://eprint.iacr.org/2006/150.
    • (2006)
    • Filho, D.L.G.1    Baretto, P.S.L.M.2
  • 4
    • 72449185582 scopus 로고    scopus 로고
    • Proofs of storage from homomorphic identification protocols. In: Proc. of ASIACRYPT '09
    • Ateniese G, Kamara S, Katz J. Proofs of storage from homomorphic identification protocols. In: Proc. of ASIACRYPT '09, 2009, pp. 319-333.
    • (2009) , pp. 319-333
    • Ateniese, G.1    Kamara, S.2    Katz, J.3
  • 5
    • 70249129465 scopus 로고    scopus 로고
    • Scalable and efficient provable data possession. In: Proc. of SecureComm '08
    • Ateniese G, Pietro R D, Mancini L V, Tsudik G. Scalable and efficient provable data possession. In: Proc. of SecureComm '08, 2008, pp.1-10.
    • (2008) , pp. 1-10
    • Ateniese, G.1    Pietro, R.D.2    Mancini, L.V.3    Tsudik, G.4
  • 6
    • 70749134001 scopus 로고    scopus 로고
    • A practical data possession checking scheme for networked archival storage
    • Xiao D, Shu J, Chen K, Zheng W. A practical data possession checking scheme for networked archival storage. Journal of Computer Research and Development 2009; 46(10):1660-1668.
    • (2009) Journal of Computer Research and Development , vol.46 , Issue.10 , pp. 1660-1668
    • Xiao, D.1    Shu, J.2    Chen, K.3    Zheng, W.4
  • 7
    • 51849117195 scopus 로고    scopus 로고
    • MR-PDP: multiple-replica provable data possession. In: Proc. of ICDCS '08
    • Curtmola R, Khan O, Burns R, Ateniese G. MR-PDP: multiple-replica provable data possession. In: Proc. of ICDCS '08, 2008, pp.411-420.
    • (2008) , pp. 411-420
    • Curtmola, R.1    Khan, O.2    Burns, R.3    Ateniese, G.4
  • 8
    • 74049121230 scopus 로고    scopus 로고
    • Dynamic provable data possession. In: Proc. of ACM-CCS '09
    • Erway C, A Küpçü, Papamanthou C, Tamassia R. Dynamic provable data possession. In: Proc. of ACM-CCS '09, 2009, pp.213-222.
    • (2009) , pp. 213-222
    • Erway, C.1    Küpçü, A.2    Papamanthou, C.3    Tamassia, R.4
  • 9
    • 46649083439 scopus 로고    scopus 로고
    • Efficient remote data possession checking in critical information infrastructures. IEEE Trans. on Knowl. and Data Eng.
    • Sebe F, Domingo J F, Martinez A B, Deswarte Y, Quisquater J. Efficient remote data possession checking in critical information infrastructures. IEEE Trans. on Knowl. and Data Eng., 2007, pp.1034-1038.
    • (2007) , pp. 1034-1038
    • Sebe, F.1    Domingo, J.F.2    Martinez, A.B.3    Deswarte, Y.4    Quisquater, J.5
  • 10
    • 74049103479 scopus 로고    scopus 로고
    • PORs: proofs of retrievability for large files. In: Proc. of ACM-CCS '07
    • Juels A, Kaliski B S. PORs: proofs of retrievability for large files. In: Proc. of ACM-CCS '07, 2007, pp.584-597.
    • (2007) , pp. 584-597
    • Juels, A.1    Kaliski, B.S.2
  • 11
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability. In: Proc. of ASIACRYPT '08,.
    • Shacham H, Waters B. Compact proofs of retrievability. In: Proc. of ASIACRYPT '08, 2008, pp.90-107.
    • (2008) , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 12
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing. J. Cryptology 2004; 17(4):297-319.
    • (2004) J. Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 13
    • 70350681128 scopus 로고    scopus 로고
    • Proofs of retrievability via hardness amplification. In: Proc. of TCC '09
    • Dodis Y, Vadhan S, Wichs D. Proofs of retrievability via hardness amplification. In: Proc. of TCC '09, 2009, pp.109-127.
    • (2009) , pp. 109-127
    • Dodis, Y.1    Vadhan, S.2    Wichs, D.3
  • 14
    • 33947694320 scopus 로고    scopus 로고
    • Store, forget, and check: using algebraic signatures to check remotely administered storage. In: Proc. of ICDCS '06,.
    • Schwarz T J E, Miller E L. Store, forget, and check: using algebraic signatures to check remotely administered storage. In: Proc. of ICDCS '06, 2006, pp.12.
    • (2006) , pp. 12
    • Schwarz, T.J.E.1    Miller, E.L.2
  • 15
    • 70349245590 scopus 로고    scopus 로고
    • Robust remote data checking. In: Proc. of StorageSS '08
    • Curtmola R, Khan O, Burns R. Robust remote data checking. In: Proc. of StorageSS '08, 2008, pp.63-68.
    • (2008) , pp. 63-68
    • Curtmola, R.1    Khan, O.2    Burns, R.3
  • 16
    • 74049136395 scopus 로고    scopus 로고
    • Proofs of retrievability: theory and implementation. In: Proc. of ACM-CCSW '09
    • Bowers K D, Juels A, Oprea A. Proofs of retrievability: theory and implementation. In: Proc. of ACM-CCSW '09, 2009, pp.43-54.
    • (2009) , pp. 43-54
    • Bowers, K.D.1    Juels, A.2    Oprea, A.3
  • 17
    • 74049144464 scopus 로고    scopus 로고
    • HAIL: a high-availability and integrity layer for cloud storage. In: Proc. of ACM-CCS '09
    • Bowers K D, Juels A, Oprea A. HAIL: a high-availability and integrity layer for cloud storage. In: Proc. of ACM-CCS '09, 2009, pp.187-198.
    • (2009) , pp. 187-198
    • Bowers, K.D.1    Juels, A.2    Oprea, A.3
  • 18
    • 70449569012 scopus 로고    scopus 로고
    • Ensuring data storage security in cloud computing. In: Proc. of IWQoS '09
    • Wang C, Wang Q, Ren K, Lou W. Ensuring data storage security in cloud computing. In: Proc. of IWQoS '09, 2009, pp.1-9.
    • (2009) , pp. 1-9
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 19
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proc. of ESORICS '09
    • Wang Q, Wang C, Li J, Ren K, Lou W. Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proc. of ESORICS '09, 2009, pp.355-370.
    • (2009) , pp. 355-370
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 20
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing. In: Proc. of INFOCOM, San Diego, CA.
    • Wang C, Wang Q, Ren K, Lou W. Privacy-preserving public auditing for data storage security in cloud computing. In: Proc. of INFOCOM 2010, San Diego, CA.
    • (2010)
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 21
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication. Advances in Cryptology-CRYPTO '96.
    • Mihir Bellare, Ran Canettiy, Hugo Krawczykz. Keying hash functions for message authentication. Advances in Cryptology-CRYPTO '96, pp. 1-15.
    • Bellare, M.1    Canettiy, R.2    Krawczykz, H.3
  • 22
    • 4544340070 scopus 로고
    • Cryptography in an algebraic alphabet
    • Hill LS. Cryptography in an algebraic alphabet. The American Mathematical Monthly 1929; 36:306-312.
    • (1929) The American Mathematical Monthly , vol.36 , pp. 306-312
    • Hill, L.S.1
  • 23
    • 4544337564 scopus 로고
    • Concerning certain linear transformation apparatus of cryptography
    • Hill LS. Concerning certain linear transformation apparatus of cryptography. The American Mathematical Monthly 1931; 38:135-154.
    • (1931) The American Mathematical Monthly , vol.38 , pp. 135-154
    • Hill, L.S.1
  • 27
    • 70449510403 scopus 로고    scopus 로고
    • A secure variant of the Hill cipher, Proceedings-IEEE Symposium on Computers and Communications-
    • Mohsen Toorani, Abolfazl Falahati, A secure variant of the Hill cipher, Proceedings-IEEE Symposium on Computers and Communications, pp.313-316, 2009.
    • (2009) , pp. 313-316
    • Toorani, M.1    Falahati, A.2
  • 29
    • 85014948963 scopus 로고    scopus 로고
    • How to make the Hill cipher secure
    • Saeednia S. How to make the Hill cipher secure. Cryptologia Journal 2000; 24(4):353-360.
    • (2000) Cryptologia Journal , vol.24 , Issue.4 , pp. 353-360
    • Saeednia, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.