메뉴 건너뛰기




Volumn 8434 LNCS, Issue , 2014, Pages 346-358

TIMER: Secure and reliable cloud storage against data re-outsourcing

Author keywords

Cloud storage; Economical server collusion; Probabilistic scheme; Storage security

Indexed keywords

NETWORK SECURITY; OUTSOURCING; SECURITY SYSTEMS;

EID: 84901649741     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-06320-1_26     Document Type: Conference Paper
Times cited : (21)

References (28)
  • 1
    • 74049102823 scopus 로고    scopus 로고
    • Provable data possession at untrusted stores
    • October
    • Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proc. of ACM CCS, Virginia, USA, pp. 598-609 (October 2007)
    • (2007) Proc. of ACM CCS, Virginia, USA , pp. 598-609
    • Ateniese, G.1
  • 2
    • 84455190541 scopus 로고    scopus 로고
    • Scalable and efficient provable data possession
    • September
    • Ateniese, G., et al.: Scalable and efficient provable data possession. In: Proc. of SecureComm, VA, USA, pp. 1-10 (September 2008)
    • (2008) Proc. of SecureComm, VA, USA , pp. 1-10
    • Ateniese, G.1
  • 3
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing effficient protocols
    • November
    • Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing effficient protocols. In: Proc. of ACM CCS, VA, USA, pp. 62-73 (November 1993)
    • (1993) Proc. of ACM CCS, VA, USA , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 84865597567 scopus 로고    scopus 로고
    • New algorithms for secure outsourcing of modular exponentiations
    • Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. Springer, Heidelberg
    • Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 541-556. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7459 , pp. 541-556
    • Chen, X.1    Li, J.2    Ma, J.3    Tang, Q.4    Lou, W.5
  • 8
    • 84859040590 scopus 로고    scopus 로고
    • Regulation of the european parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data
    • directive 95/46/EC
    • Commission, E.: Regulation of the european parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data. general data protection regulation, directive 95/46/EC (2012)
    • (2012) General Data Protection Regulation
    • Commission, E.1
  • 9
    • 84921068281 scopus 로고    scopus 로고
    • On the exact security of full domain hash
    • Bellare, M. (ed.) CRYPTO 2000. Springer, Heidelberg
    • Coron, J.-S.: On the exact security of full domain hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 229-235. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 229-235
    • Coron, J.-S.1
  • 11
    • 70350681128 scopus 로고    scopus 로고
    • Proofs of retrievability via hardness amplification
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 109-127. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 109-127
    • Dodis, Y.1    Vadhan, S.2    Wichs, D.3
  • 13
  • 14
    • 47849089563 scopus 로고    scopus 로고
    • Demonstrating data possession and uncheatable data transfer
    • Filho, D.L.G., Baretto, P.S.L.M.: Demonstrating data possession and uncheatable data transfer. IACR ePrint archive 2006 (2006), http://eprint.iacr. org/2006/150
    • (2006) IACR EPrint Archive 2006
    • Filho, D.L.G.1    Baretto, P.S.L.M.2
  • 20
    • 84969346266 scopus 로고
    • A certified digital signature
    • Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
    • Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218-238. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 218-238
    • Merkle, R.C.1
  • 21
    • 84901654486 scopus 로고    scopus 로고
    • Provable data possession at untrusted stores
    • June
    • Papagiannaki, K., et al.: Provable data possession at untrusted stores. In: Proc. IEEE INFOCOM 2002, NY, USA, pp. 535-544 (June 2002)
    • (2002) Proc. IEEE INFOCOM 2002, NY, USA , pp. 535-544
    • Papagiannaki, K.1
  • 22
    • 33947694320 scopus 로고    scopus 로고
    • Store, forget, and check: Using algebraic signatures to check remotely administered storage
    • July
    • Schwarz, T.S.J., Miller, E.L.: Store, forget, and check: Using algebraic signatures to check remotely administered storage. In: Proceedings of ICDCS 2006, Lisboa, Portugal, pp. 1-12 (July 2006)
    • (2006) Proceedings of ICDCS 2006, Lisboa, Portugal , pp. 1-12
    • Schwarz, T.S.J.1    Miller, E.L.2
  • 23
    • 46649100533 scopus 로고    scopus 로고
    • Tech. Rep. 04429, Universitat Rovira i Virgili, Tarragona, Spain July
    • Sebe, F., et al.: Time-bounded remote file integrity checking. Tech. Rep. 04429, Universitat Rovira i Virgili, Tarragona, Spain (July 2004)
    • (2004) Time-bounded Remote File Integrity Checking
    • Sebe, F.1
  • 27
    • 77952381914 scopus 로고    scopus 로고
    • An efficiently-verifiable zero-knowledge argument for proofs of knowledge
    • July
    • Yamamoto, G., Fujisaki, E., Abe, M.: An efficiently-verifiable zero-knowledge argument for proofs of knowledge. IEICE Technical Report ISEC2005-48 105, 41-45 (July 2005)
    • (2005) IEICE Technical Report ISEC2005-48 , vol.105 , pp. 41-45
    • Yamamoto, G.1    Fujisaki, E.2    Abe, M.3
  • 28
    • 63449088479 scopus 로고    scopus 로고
    • Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings
    • Information Security and Privacy
    • Zhang, F., Kim, K.: Efficient id-based blind signature and proxy signature from bilinear pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 312-323. Springer, Heidelberg (2003) (Pubitemid 36892644)
    • (2003) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2727 , pp. 312-323
    • Zhang, F.1    Kim, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.