메뉴 건너뛰기




Volumn 10, Issue 2, 2014, Pages 210-223

Design and implementation of a privacy preserved off-premises cloud storage

Author keywords

Cloud Storage; Confidentiality; Integrity; Privacy; Security

Indexed keywords


EID: 84894582447     PISSN: 15493636     EISSN: None     Source Type: Journal    
DOI: 10.3844/jcssp.2014.210.223     Document Type: Article
Times cited : (8)

References (15)
  • 1
    • 84868152765 scopus 로고    scopus 로고
    • Insider attacks in cloud computing. Proceedings of 11th International Conference on Trust, Security and Privacy in Computing and Communications
    • Jun. 25-27, IEEE Xplore Press, England, DOI: 10.1109/TrustCom.2012.188
    • Adrian, D., S. Creese and M. Goldsmith, 2012. Insider attacks in cloud computing. Proceedings of 11th International Conference on Trust, Security and Privacy in Computing and Communications, Jun. 25-27, IEEE Xplore Press, England, pp: 857-862. DOI: 10.1109/TrustCom.2012.188
    • (2012) , pp. 857-862
    • Adrian, D.1    Creese, S.2    Goldsmith, M.3
  • 4
    • 80052864529 scopus 로고    scopus 로고
    • The final frontier: Confidentiality and privacy in the cloud. Computer
    • DOI: 10.1109/MC.2011.223
    • Francisco, R., S. Abreu and M. Correia, 2011. The final frontier: Confidentiality and privacy in the cloud. Computer, 44: 44-50. DOI: 10.1109/MC.2011.223
    • (2011) , vol.44 , pp. 44-50
    • Francisco, R.1    Abreu, S.2    Correia, M.3
  • 5
    • 79957834847 scopus 로고    scopus 로고
    • Processing private queries over untrusted data cloud through privacy homomorphism. Proceedings of the 27th International Conference on Data Engineering, Apr. 11-16, IEEE Xplore Press, Germany
    • DOI: 10.1109/ICDE.2011.5767862
    • Hibo, H., J. Xu, C. Ren and B. Choi, 2011. Processing private queries over untrusted data cloud through privacy homomorphism. Proceedings of the 27th International Conference on Data Engineering, Apr. 11-16, IEEE Xplore Press, Germany, pp: 601-61. DOI: 10.1109/ICDE.2011.5767862
    • (2011) , pp. 601-661
    • Hibo, H.1    Xu, J.2    Ren, C.3    Choi, B.4
  • 7
    • 84863127613 scopus 로고    scopus 로고
    • Study on the third-party audit in cloud storage service.
    • Dec. 12-14, IEEE Xplore Press, Hong Kong, DOI: 10.1109/CSC.2011.6138525
    • Ling, L., X. Lin, L. Jing and C. Zhang, 2011. Study on the third-party audit in cloud storage service. Proceedings of teg International Conference on Cloud and Service Computing, Dec. 12-14, IEEE Xplore Press, Hong Kong, pp: 220-227. DOI: 10.1109/CSC.2011.6138525
    • (2011) Proceedings of teg International Conference on Cloud and Service Computing , pp. 220-227
    • Ling, L.1    Lin, X.2    Jing, L.3    Zhang, C.4
  • 9
    • 80053418474 scopus 로고    scopus 로고
    • A threat free architecture for privacy assurance in cloud computing.
    • Jul. 4-9, IEEE Xplore Press, USA., DOI: 10.1109/SERVICES.2011.11
    • Prasadreddy, P., T. Srinivasa and S. Phani, 2011. A threat free architecture for privacy assurance in cloud computing. Proceedings of the IEEE World Congress on Services, Jul. 4-9, IEEE Xplore Press, USA., pp: 564-568. DOI: 10.1109/SERVICES.2011.11
    • (2011) Proceedings of the IEEE World Congress on Services , pp. 564-568
    • Prasadreddy, P.1    Srinivasa, T.2    Phani, S.3
  • 10
    • 78650536265 scopus 로고    scopus 로고
    • Protection of identity information in cloud computing without trusted third party.
    • Oct. 31 Nov. -03, IEEE Xplore Press, Indian DOI: 10.1109/SRDS.2010.57
    • Ranchal, R., B. Bhargava, L. Ben and L. Lilien, 2010. Protection of identity information in cloud computing without trusted third party. Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems, Oct. 31 Nov. -03, IEEE Xplore Press, Indian, pp: 368-372. DOI: 10.1109/SRDS.2010.57
    • (2010) Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems , pp. 368-372
    • Ranchal, R.1    Bhargava, B.2    Ben, L.3    Lilien, L.4
  • 11
    • 80052161321 scopus 로고    scopus 로고
    • Lucy in the sky without diamonds: Stealing confidential data in the cloud.
    • Jun. 27-30, IEEE Xplore Press, Hong Kong. DOI: 10.1109/DSNW.2011.5958798
    • Rocha, F and M. Correia, 2011. Lucy in the sky without diamonds: Stealing confidential data in the cloud. Proceedings of the 41st International Conference on Dependable Systems and Networks Workshops, Jun. 27-30, IEEE Xplore Press, Hong Kong, pp: 129-134. DOI: 10.1109/DSNW.2011.5958798
    • (2011) Proceedings of the 41st International Conference on Dependable Systems and Networks Workshops , pp. 129-134
    • Rocha, F.1    Correia, M.2
  • 12
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable and fine-grained data access control in cloud computing.
    • Mar. 14-19, IEEE Xplore Press, USA., DOI: 10.1109/INFCOM.2010.5462174
    • Shucheng, Y., C. Wang, K. Ren and W. Lou, 2010. Achieving secure, scalable and fine-grained data access control in cloud computing. Proceedings of the 30th International Conference on Computer Communications, Mar. 14-19, IEEE Xplore Press, USA., pp: 1-9. DOI: 10.1109/INFCOM.2010.5462174
    • (2010) Proceedings of the 30th International Conference on Computer Communications , pp. 1-9
    • Shucheng, Y.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 13
    • 84862848411 scopus 로고    scopus 로고
    • Improving public auditability, data possession in data storage security for cloud computing.
    • Apr. 19- 21, IEEE Xplore Press, India, DOI: 10.1109/ICRTIT.2012.6206835
    • Venkatesh, M., M.R. Sumalatha and C. SelvaKumar, 2012. Improving public auditability, data possession in data storage security for cloud computing. Proceedings of the International Conference on Recent Trends in Information Technology, Apr. 19- 21, IEEE Xplore Press, India, pp: 463-467. DOI: 10.1109/ICRTIT.2012.6206835
    • (2012) Proceedings of the International Conference on Recent Trends in Information Technology , pp. 463-467
    • Venkatesh, M.1    Sumalatha, M.R.2    SelvaKumar, C.3
  • 14
    • 77953295132 scopus 로고    scopus 로고
    • Privacypreserving public auditing for data storage security in cloud computing.
    • Mar. 14-19, IEEE Xplore Press, USA., DOI: 10.1109/INFCOM.2010.5462173
    • Wang, C., Q. Wang, K. Ren and W. Lou, 2010. Privacypreserving public auditing for data storage security in cloud computing. Proceedings of the 30th International Conference on Computer Communications, Mar. 14-19, IEEE Xplore Press, USA., pp: 1-9. DOI: 10.1109/INFCOM.2010.5462173
    • (2010) Proceedings of the 30th International Conference on Computer Communications , pp. 1-9
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 15
    • 84863088193 scopus 로고    scopus 로고
    • Cloud computing concepts, architecture and challenges. Proceedings of the International Conference on Computing, Electronics and Electrical Technologies, Mar. 21-22, IEEE Xplore Press, India, DOI: 10.1109/ICCEET.2012.6203873
    • Yashpalsinh, J. and K. Modi, 2012. Cloud computing concepts, architecture and challenges. Proceedings of the International Conference on Computing, Electronics and Electrical Technologies, Mar. 21-22, IEEE Xplore Press, India, pp: 877-880. DOI: 10.1109/ICCEET.2012.6203873
    • (2012) , pp. 877-880
    • Yashpalsinh, J.1    Modi, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.