메뉴 건너뛰기




Volumn 8434 LNCS, Issue , 2014, Pages 359-372

Improvement of a remote data possession checking protocol from algebraic signatures

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84901671467     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-06320-1_27     Document Type: Conference Paper
Times cited : (4)

References (24)
  • 1
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
    • Buyyaa, R., Yeoa, C., Broberga, J., Brandicc, I.: Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems 25(6), 599-616 (2009)
    • (2009) Future Generation Computer Systems , vol.25 , Issue.6 , pp. 599-616
    • Buyyaa, R.1    Yeoa, C.2    Broberga, J.3    Brandicc, I.4
  • 2
    • 79959557055 scopus 로고    scopus 로고
    • Addressing cloud computing security issues
    • Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Generation Computer Systems 28(3), 583-592 (2012)
    • (2012) Future Generation Computer Systems , vol.28 , Issue.3 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2
  • 6
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
    • Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90-107. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5350 , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 7
    • 84878998883 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • Shacham, H., Waters, B.: Compact proofs of retrievability. Journal of Cryptology 26(3), 442-483 (2013)
    • (2013) Journal of Cryptology , vol.26 , Issue.3 , pp. 442-483
    • Shacham, H.1    Waters, B.2
  • 8
    • 72449185582 scopus 로고    scopus 로고
    • Proofs of storage from homomorphic identification protocols
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Ateniese, G., Kamara, S., Katz, J.: Proofs of storage from homomorphic identification protocols. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 319-333. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 319-333
    • Ateniese, G.1    Kamara, S.2    Katz, J.3
  • 9
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing
    • Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
    • Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355-370. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5789 , pp. 355-370
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 10
    • 79953294892 scopus 로고    scopus 로고
    • Enabling public auditability and data dynamics for storage security in cloud computing
    • Wang, Q.,Wang, C., Ren, K., Lou,W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847-859 (2012)
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Ren, K.3    Lou, W.4    Li, J.5
  • 11
    • 77954843911 scopus 로고    scopus 로고
    • Toward public auditable secure cloud data storage services
    • Wang, C., Ren, K., Lou, W., Li, J.: Toward public auditable secure cloud data storage services. IEEE Network 24(4), 19-24 (2010)
    • (2010) IEEE Network , vol.24 , Issue.4 , pp. 19-24
    • Wang, C.1    Ren, K.2    Lou, W.3    Li, J.4
  • 12
    • 84863498079 scopus 로고    scopus 로고
    • Yau: Efficient audit service outsourcing for data integrity in clouds
    • Zhu, Y., Hu, H., Ahn, G.J., Stephen, S.: Yau: efficient audit service outsourcing for data integrity in clouds. Journal of Systems and Software 85(5), 1083-1095 (2012)
    • (2012) Journal of Systems and Software , vol.85 , Issue.5 , pp. 1083-1095
    • Zhu, Y.1    Hu, H.2    Ahn, G.J.3    Stephen, S.4
  • 13
    • 84869466694 scopus 로고    scopus 로고
    • Cooperative provable data possession for integrity verification in multicloud storage
    • Zhu, Y., Hu, H., Ahn, G.J., Yu, M.: Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231-2244 (2012)
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.12 , pp. 2231-2244
    • Zhu, Y.1    Hu, H.2    Ahn, G.J.3    Yu, M.4
  • 14
    • 84881080693 scopus 로고    scopus 로고
    • An efficient and secure dynamic auditing protocol for data storage in cloud computing
    • Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717-1726 (2013)
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.9 , pp. 1717-1726
    • Yang, K.1    Jia, X.2
  • 15
    • 84870526931 scopus 로고    scopus 로고
    • Secure collaborative integrity verification for hybrid cloud environments
    • Zhu, Y., Wang, S.B., Hu, H., Ahn, G.J., Ma, D.: Secure collaborative integrity verification for hybrid cloud environments. Int. J. Cooperative Inf. Syst. 21(3), 165-198 (2012)
    • (2012) Int. J. Cooperative Inf. Syst. , vol.21 , Issue.3 , pp. 165-198
    • Zhu, Y.1    Wang, S.B.2    Hu, H.3    Ahn, G.J.4    Ma, D.5
  • 16
    • 84861959172 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for secure cloud storage
    • Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Computers 62(2), 362-375 (2013)
    • (2013) IEEE Trans. Computers , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.S.M.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 19
    • 70350681128 scopus 로고    scopus 로고
    • Proofs of retrievability via hardness amplification
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 109-127. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 109-127
    • Dodis, Y.1    Vadhan, S.2    Wichs, D.3
  • 20
    • 84885645897 scopus 로고    scopus 로고
    • Using algebraic signatures to check data possession in cloud storage
    • Chen, L.: Using algebraic signatures to check data possession in cloud storage. Future Generation Computer Systems 29(7), 1709-1715 (2013)
    • (2013) Future Generation Computer Systems , vol.29 , Issue.7 , pp. 1709-1715
    • Chen, L.1
  • 21
    • 33947694320 scopus 로고    scopus 로고
    • Store, forget, and check: Using algebraic signatures to check remotely administered storage
    • IEEE Computer Society
    • Schwarz, T., Miller, E.: Store, forget, and check: using algebraic signatures to check remotely administered storage. In: Proceeding of ICDCS 2006, Lisbon, Portugal, p. 12. IEEE Computer Society (2006)
    • (2006) Proceeding of ICDCS 2006, Lisbon, Portugal , pp. 12
    • Schwarz, T.1    Miller, E.2
  • 22
    • 84901667966 scopus 로고    scopus 로고
    • On the security of an efficient dynamic auditing protocol in cloud storage
    • doi:10.1109/TPDS.2013.199
    • Ni, J., Yu, Y., Mu, Y., Xia, Q.: On the security of an efficient dynamic auditing protocol in cloud storage. IEEE Transactions on Parallel and Distributed Systems (2013), doi:10.1109/TPDS.2013.199
    • (2013) IEEE Transactions on Parallel and Distributed Systems
    • Ni, J.1    Yu, Y.2    Mu, Y.3    Xia, Q.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.