-
1
-
-
84874108116
-
Beyond lightning: A survey on security challenges in cloud computing
-
C. Rong, S.T. Nguyen, and M.G. Jaatun Beyond lightning: a survey on security challenges in cloud computing Comput Electr Eng 39 2013 47 54
-
(2013)
Comput Electr Eng
, vol.39
, pp. 47-54
-
-
Rong, C.1
Nguyen, S.T.2
Jaatun, M.G.3
-
2
-
-
79959823910
-
Remote data checking using provable data possession
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, and L. Kissner et al. Remote data checking using provable data possession ACM Trans Inf Syst Secur 14 2011 1 34
-
(2011)
ACM Trans Inf Syst Secur
, vol.14
, pp. 1-34
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Khan, O.5
Kissner, L.6
-
3
-
-
74049102823
-
Provable data possession at untrusted stores
-
CCS
-
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, et al. Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on computer and communications security, CCS 2007. p. 598-609.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
-
5
-
-
84902475228
-
-
S. Jajodia, L. Strous, Springer Boston
-
Y. Deswarte, J.-J. Quisquater, and A. Saïdane S. Jajodia, L. Strous, Remote integrity checking: integrity and internal control in information systems VI vol. 140 2004 Springer Boston 1 11
-
(2004)
Remote Integrity Checking: Integrity and Internal Control in Information Systems VI
, vol.140 VOL.
, pp. 1-11
-
-
Deswarte, Y.1
Quisquater, J.-J.2
Saïdane, A.3
-
6
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
O. Reingold, Springer Berlin/Heidelberg
-
Y. Dodis, S. Vadhan, and D. Wichs Proofs of retrievability via hardness amplification O. Reingold, Theory of cryptography vol. 5444 2009 Springer Berlin/Heidelberg 109 127
-
(2009)
Theory of Cryptography
, vol.5444 VOL.
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
8
-
-
58349118819
-
Compact proofs of retrievability
-
J. Pieprzyk, Springer Berlin/Heidelberg
-
H. Shacham, and B. Waters Compact proofs of retrievability J. Pieprzyk, Advances in cryptology - ASIACRYPT 2008 vol. 5350 2008 Springer Berlin/Heidelberg 90 107
-
(2008)
Advances in Cryptology - ASIACRYPT 2008
, vol.5350 VOL.
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
11
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
Wang C, Wang Q, Ren K, Lou W. Privacy-preserving public auditing for data storage security in cloud computing. In: INFOCOM, 2010 proceedings IEEE; 2010. p. 1-9.
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
13
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
M. Backes, P. Ning, Springer Berlin/Heidelberg
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou Enabling public verifiability and data dynamics for storage security in cloud computing M. Backes, P. Ning, Computer security - ESORICS 2009 vol. 5789 2009 Springer Berlin/Heidelberg 355 370
-
(2009)
Computer Security - ESORICS 2009
, vol.5789 VOL.
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
14
-
-
79960900327
-
A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
-
H. Zhuo, Z. Sheng, and Y. Nenghai A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability IEEE Trans Knowl Data Eng 23 2011 1432 1437
-
(2011)
IEEE Trans Knowl Data Eng
, vol.23
, pp. 1432-1437
-
-
Zhuo, H.1
Sheng, Z.2
Nenghai, Y.3
-
15
-
-
84867487685
-
Cryptanalysis of Wang's auditing protocol for data storage security in cloud computing
-
C. Liu, Springer Berlin Heidelberg
-
X. Chunxiang, H. Xiaohu, and W. Daniel-Abraha Cryptanalysis of Wang's auditing protocol for data storage security in cloud computing C. Liu, Information computing and applications vol. 308 2012 Springer Berlin Heidelberg 422 428
-
(2012)
Information Computing and Applications
, vol.308 VOL.
, pp. 422-428
-
-
Chunxiang, X.1
Xiaohu, H.2
Daniel-Abraha, W.3
-
18
-
-
84946840347
-
Short signatures from the weil pairing
-
C. Boyd, Springer Berlin/Heidelberg
-
D. Boneh, B. Lynn, and H. Shacham Short signatures from the weil pairing C. Boyd, Advances in cryptology - ASIACRYPT 2001 vol. 2248 2001 Springer Berlin/Heidelberg 514 532
-
(2001)
Advances in Cryptology - ASIACRYPT 2001
, vol.2248 VOL.
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
19
-
-
84902310959
-
Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage
-
D. Koo, J. Hur, and H. Yoon Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage Comput Electr Eng 2012
-
(2012)
Comput Electr Eng
-
-
Koo, D.1
Hur, J.2
Yoon, H.3
-
21
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li Enabling public auditability and data dynamics for storage security in cloud computing IEEE Trans Parallel Distrib Syst 22 2011 847 859
-
(2011)
IEEE Trans Parallel Distrib Syst
, vol.22
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
|