메뉴 건너뛰기




Volumn 11, Issue 4, 2014, Pages 98-110

A data assured deletion scheme in cloud storage

Author keywords

cloud storage; data confidentiality; data dynamics; secure data assured deletion

Indexed keywords


EID: 84903716872     PISSN: 16735447     EISSN: None     Source Type: Journal    
DOI: 10.1109/CC.2014.6827572     Document Type: Article
Times cited : (11)

References (25)
  • 2
    • 85081813485 scopus 로고    scopus 로고
    • AMAZON. SmugMug Case Study: Amazon Web Services[EB/OL]. [2006]
    • AMAZON. SmugMug Case Study: Amazon Web Services[EB/OL]. [2006]. http://aws.ama-zon. com/solutions/case-studies/smugmug/.
  • 3
    • 79951999348 scopus 로고    scopus 로고
    • Study on cloud computing security[j]
    • FENG Dengguo, ZHANG Min, ZHANG Yan, et al. Study on Cloud Computing Security[J]. Joumal of Software, 2011, 22(1): 71-83.
    • (2011) Joumal of Software , vol.22 , Issue.1 , pp. 71-83
    • Dengguo, F.1    Min, Z.2    Yan, Z.3
  • 6
    • 80155161434 scopus 로고    scopus 로고
    • A secure cloud backup system with assured deletion and version control[cl
    • September 13-16 2011. Taipei, Taiwan IEEE Computer Society Washington, DC, USA
    • ARTHUR Rahumed, Henry C. H. Chen, YANG Tang, et al. A Secure Cloud Backup System with Assured Deletion and Version Control[Cl//Proceedings of the 40th International Conference on Parallel Processing Workshops (ICPPW'11): September 13-16, 2011. Taipei, Taiwan. IEEE Computer Society Washington, DC, USA, 2011: 160-167.
    • (2011) Proceedings of the 40th International Conference on Parallel Processing Workshops (ICPPW'11) , pp. 160-167
    • Rahumed, A.1    Chen, H.C.H.2    Tang, Y.3
  • 7
    • 85018107502 scopus 로고    scopus 로고
    • Vanish: Increasing data privacy with self-de-structing data[cl
    • Montreal, Canada. Berkeley, CA: USENIX Association
    • ROXANA G, TADAYOSHI K, AMIT A. Levy, et al. Vanish: Increasing Data Privacy with Self-De-structing Data[Cl//Proceedings of USENIX Se-curity'09: August 10-14, 2009. Montreal, Canada. Berkeley, CA: USENIX Association, 2009: 299-316.
    • (2009) Proceedings of USENIX Se-curity'09: August 10-14 2009 , pp. 299-316
    • Roxana, G.1    Tadayoshi, K.2    Levy, A.A.3
  • 8
    • 79955052666 scopus 로고    scopus 로고
    • Research on the model and algorithms based on distributed spanning tree for resource location service[j]
    • WANG Tiejun, LlU Heng, SUN Ming, et al. Research on the Model and Algorithms based on Distributed Spanning Tree for Resource Location Service[J]. Acta Electronica Sinica, 2011, 39(1): 364-369.
    • (2011) Acta Electronica Sinica , vol.39 , Issue.1 , pp. 364-369
    • Tiejun, W.1    Heng, L.2    Ming, S.3
  • 10
    • 85180531810 scopus 로고    scopus 로고
    • Defeating vanish with low-cost sybil attacks against large dhts[cl
    • February 28-March 3 2010. San Diego, California, USA. Washington, DC: Intemet Society
    • SCOTT W, OWEN S. Hofmann, NADIA H, et al. Defeating Vanish with Low-cost Sybil Attacks Against Large DHTs[ClI/Proceedings of the 17th Network and Distributed System Security Symposium (NDSS'10): February 28-March 3, 2010. San Diego, California, USA. Washington, DC: Intemet Society, 2010: 37-51.
    • (2010) Proceedings of the 17th Network and Distributed System Security Symposium (NDSS'10) , pp. 37-51
    • Scott, W.1    Hofmann, O.S.2    Nadia, H.3
  • 11
    • 84859234133 scopus 로고    scopus 로고
    • A data assured deletion approach adapted for cloud storage[j]
    • WANG Lina, REN Zhengwei, YU Rongwei, et al. A Data Assured Deletion Approach Adapted for Cloud Storage[J]. Acta Electronica Sinica, 2012, 40(2): 266-272.
    • (2012) Acta Electronica Sinica , vol.40 , Issue.2 , pp. 266-272
    • Lina, W.1    Zhengwei, R.2    Rongwei, Y.U.3
  • 18
    • 84947912552 scopus 로고    scopus 로고
    • All-or-nothing encryption and the package transform[cl
    • January 20-22, 1997. Haifa, Israel. Springer-Verlag Berlin, Heidelberg
    • RIVEST R L All-or-Nothing Encryption and the Package Transform[Cl// Proceedings of the 1997 Fast Software Encryption Conference (FSE'97): January 20-22, 1997. Haifa, Israel. Springer-Verlag Berlin, Heidelberg, 1997: 210-218.
    • (1997) Proceedings of the 1997 Fast Software Encryption Conference (FSE'97) , pp. 210-218
    • Rivest, R.L.1
  • 23
    • 0018545449 scopus 로고
    • How to share a secret[j]
    • SHAMIR A. How to Share a Secret[J]. Communications of the AMC, 1979, 22(11): 612-613.
    • (1979) Communications of the AMC , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 24
    • 80052798570 scopus 로고    scopus 로고
    • Capability of evolutionary cryptosystems against differential cryptanalysis[j]
    • ZHANG HuanGuo, LI ChunLei, TANG Ming. Capability of Evolutionary Cryptosystems Against Differential Cryptanalysis[J]. Science China Information Science, 2011, 54(10): 1991-2000.
    • (2011) Science China Information Science , vol.54 , Issue.10 , pp. 1991-2000
    • Huanguo, Z.1    Chunlei, L.I.2    Ming, T.3
  • 25
    • 84867869103 scopus 로고    scopus 로고
    • Evolutionary chipers against differential power analysis and differential fault analysis[j]
    • TANG Ming, QIU ZhenLong, YANG Min, et al. Evolutionary Chipers Against Differential Power Analysis and Differential Fault Analysis[J]. Science China Information Science, 2012, 55(11): 2555-2569.
    • (2012) Science China Information Science , vol.55 , Issue.11 , pp. 2555-2569
    • Ming, T.1    Zhenlong, Q.2    Min, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.