메뉴 건너뛰기




Volumn 2014, Issue , 2014, Pages

Towards dynamic remote data auditing in computational clouds

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHM; ARTICLE; CLOUD COMPUTING; COMMERCIAL PHENOMENA; COMPUTER SYSTEM; DATA PROCESSING; HUMAN; INFORMATION PROCESSING; MASS COMMUNICATION; MATHEMATICS; REMOTE DATA AUDITING; COMPARATIVE STUDY; COMPUTER SECURITY; COMPUTER SIMULATION; INFORMATION RETRIEVAL; INFORMATION SYSTEM; METHODOLOGY; PROCEDURES; THEORETICAL MODEL;

EID: 84904635972     PISSN: 23566140     EISSN: 1537744X     Source Type: Journal    
DOI: 10.1155/2014/269357     Document Type: Article
Times cited : (33)

References (40)
  • 2
    • 80155167231 scopus 로고    scopus 로고
    • A security framework of group location-based mobile applications in cloud computing
    • September Taipei, Taiwan 10.1109/ICPPW.2011.6 2-s2.0-80155167231
    • Chen Y.-J., Wang L.-C., A security framework of group location-based mobile applications in cloud computing. Proceeding of the International Conference on Parallel Processing Workshops (ICPPW '11) September 2011 Taipei, Taiwan 184 190 10.1109/ICPPW.2011.6 2-s2.0-80155167231
    • (2011) Proceeding of the International Conference on Parallel Processing Workshops (ICPPW '11) , pp. 184-190
    • Chen, Y.-J.1    Wang, L.-C.2
  • 5
    • 77954843911 scopus 로고    scopus 로고
    • Toward publicly auditable secure cloud data storage services
    • 10.1109/MNET.2010.5510914 2-s2.0-77954843911
    • Wang C., Ren K., Lou W., Li J., Toward publicly auditable secure cloud data storage services. IEEE Network 2010 24 4 19 24 10.1109/MNET.2010.5510914 2-s2.0-77954843911
    • (2010) IEEE Network , vol.24 , Issue.4 , pp. 19-24
    • Wang, C.1    Ren, K.2    Lou, W.3    Li, J.4
  • 6
    • 84889087663 scopus 로고    scopus 로고
    • Security and privacy for storage and computation in cloud computing
    • 10.1016/j.ins.2013.04.028 2-s2.0-84877596233
    • Wei L., Zhu H., Cao Z., Dong X., Jia W., Chen Y., Vasilakos A. V., Security and privacy for storage and computation in cloud computing. Information Sciences 2014 258 371 386 10.1016/j.ins.2013.04.028 2-s2.0-84877596233
    • (2014) Information Sciences , vol.258 , pp. 371-386
    • Wei, L.1    Zhu, H.2    Cao, Z.3    Dong, X.4    Jia, W.5    Chen, Y.6    Vasilakos, A.V.7
  • 7
    • 56449089063 scopus 로고    scopus 로고
    • Multimodal face and fingerprint biometrics authentication on space-limited tokens
    • 10.1016/j.neucom.2007.12.017 2-s2.0-56449089063
    • Khan M. K., Zhang J., Multimodal face and fingerprint biometrics authentication on space-limited tokens. Neurocomputing 2008 71 13-15 3026 3031 10.1016/j.neucom.2007.12.017 2-s2.0-56449089063
    • (2008) Neurocomputing , vol.71 , Issue.13-15 , pp. 3026-3031
    • Khan, M.K.1    Zhang, J.2
  • 9
    • 84904698524 scopus 로고    scopus 로고
    • Amazon's S3 down for several hours, 2008
    • Gohring N.,. Amazon's S3 down for several hours, 2008, http://status.aws.amazon.com/s3-20080720.html
    • Gohring, N.1
  • 12
    • 84904648305 scopus 로고    scopus 로고
    • Epsilon breach: hack of the century?, 2011
    • Storm D.,. Epsilon breach: hack of the century?, 2011, http://blogs.computerworld.com/18079/epsilon-breach-hack-of-the-century
    • Storm, D.1
  • 17
    • 84881080693 scopus 로고    scopus 로고
    • An efficient and secure dynamic auditing protocol for data storage in cloud computing
    • 10.1109/TPDS.2012.278
    • Yang K., Jia X., An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transactions on Parallel and Distributed Systems 2012 24 9 1717 1726 10.1109/TPDS.2012.278
    • (2012) IEEE Transactions on Parallel and Distributed Systems , vol.24 , Issue.9 , pp. 1717-1726
    • Yang, K.1    Jia, X.2
  • 19
    • 79953294892 scopus 로고    scopus 로고
    • Enabling public auditability and data dynamics for storage security in cloud computing
    • 10.1109/TPDS.2010.183 2-s2.0-79953294892
    • Wang Q.-A., Wang C., Ren K., Lou W.-J., Li J., Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems 2011 22 5 847 859 10.1109/TPDS.2010.183 2-s2.0-79953294892
    • (2011) IEEE Transactions on Parallel and Distributed Systems , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.-A.1    Wang, C.2    Ren, K.3    Lou, W.-J.4    Li, J.5
  • 20
    • 84861957968 scopus 로고    scopus 로고
    • Toward secure and dependable storage services in cloud computing
    • 10.1109/TSC.2011.24 2-s2.0-84861957968
    • Wang C., Wang Q., Ren K., Cao N., Lou W., Toward secure and dependable storage services in cloud computing. IEEE Transactions on Services Computing 2012 5 2 220 232 10.1109/TSC.2011.24 2-s2.0-84861957968
    • (2012) IEEE Transactions on Services Computing , vol.5 , Issue.2 , pp. 220-232
    • Wang, C.1    Wang, Q.2    Ren, K.3    Cao, N.4    Lou, W.5
  • 21
    • 84890471117 scopus 로고    scopus 로고
    • Proxy provable data possession in public clouds
    • Wang H., Proxy provable data possession in public clouds. IEEE Transactions on Services Computing 2012 6 4 551 559
    • (2012) IEEE Transactions on Services Computing , vol.6 , Issue.4 , pp. 551-559
    • Wang, H.1
  • 22
    • 84861959172 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for secure cloud storage
    • 10.1109/TC.2011.245
    • Wang C., Chow S. S. M., Wang Q., Ren K., Lou W., Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers 2013 62 2 362 375 10.1109/TC.2011.245
    • (2013) IEEE Transactions on Computers , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.S.M.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 23
    • 84871533728 scopus 로고    scopus 로고
    • Proof of possession for cloud storage via lagrangian interpolation techniques
    • Berlin, Germany Springer Lecture Notes in Computer Science
    • Krzywiecki Ł., Kutyłowski M., Xu L., Bertino E., Mu Y., Proof of possession for cloud storage via lagrangian interpolation techniques. Network and System Security 2012 7645 Berlin, Germany Springer 305 319 Lecture Notes in Computer Science
    • (2012) Network and System Security , vol.7645 , pp. 305-319
    • Krzywiecki, Ł.1    Kutyłowski, M.2    Xu, L.3    Bertino, E.4    Mu, Y.5
  • 27
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • Berlin, Germany Springer 10.1007/3-540-39200-9-26 MR2090433 2-s2.0-35248835575
    • Boneh D., Gentry C., Lynn B., Shacham H., Aggregate and verifiably encrypted signatures from bilinear maps. Advances in Cryptology (EUROCRYPT) 2003 Berlin, Germany Springer 416 432 10.1007/3-540-39200-9-26 MR2090433 2-s2.0-35248835575
    • (2003) Advances in Cryptology (EUROCRYPT) , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 29
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • Goldreich O., Ostrovsky R., Software protection and simulation on oblivious RAMs. Journal of the ACM 1996 43 3 431 473 10.1145/233551.233553 MR1408562 2-s2.0-0030149547 (Pubitemid 126607640)
    • (1996) Journal of the ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 30
    • 0025436383 scopus 로고
    • Skip lists. A probabilistic alternative to balanced trees
    • DOI 10.1145/78973.78977
    • Pugh W., Skip lists: a probabilistic alternative to balanced trees. Communications of the ACM 1990 33 6 668 676 10.1145/78973.78977 (Pubitemid 21672422)
    • (1990) Communications of the ACM , vol.33 , Issue.6 , pp. 668-676
    • Pugh William1
  • 31
    • 84900355325 scopus 로고    scopus 로고
    • Efficient dynamic provable possession of remote data via update trees
    • Zhang Y., Blanton M., Efficient dynamic provable possession of remote data via update trees. IACR Cryptology ePrint Archive 2012 2012 291
    • (2012) IACR Cryptology EPrint Archive , vol.2012 , pp. 291
    • Zhang, Y.1    Blanton, M.2
  • 32
    • 84920380941 scopus 로고
    • Protocols for public key cryptosystems
    • April 10.1109/SP.1980.10006 2-s2.0-0019292439
    • Merkle R. C., Protocols for public key cryptosystems. Proceedings of the IEEE Symposium on Security and Privacy April 1980 122 134 10.1109/SP.1980.10006 2-s2.0-0019292439
    • (1980) Proceedings of the IEEE Symposium on Security and Privacy , pp. 122-134
    • Merkle, R.C.1
  • 33
    • 84873952327 scopus 로고    scopus 로고
    • Algebraic (trapdoor) one-way functions and their applications
    • Berlin, Germany Springer Lecture Notes in Computer Science
    • Catalano D., Fiore D., Gennaro R., Vamvourellis K., Sahai A., Algebraic (trapdoor) one-way functions and their applications. Theory of Cryptography 2013 7785 Berlin, Germany Springer 680 699 Lecture Notes in Computer Science
    • (2013) Theory of Cryptography , vol.7785 , pp. 680-699
    • Catalano, D.1    Fiore, D.2    Gennaro, R.3    Vamvourellis, K.4    Sahai, A.5
  • 35
    • 33947694320 scopus 로고    scopus 로고
    • Store, forget, and check: Using algebraic signatures to check remotely administered storage
    • DOI 10.1109/ICDCS.2006.80, 26th IEEE Internationa26th IEEE International Conference on Distributed Computing Systems, ICDCS 2006
    • Schwarz T. S. J., Miller E. L., Store, forget, and check: using algebraic signatures to check remotely administered storage. Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS '06) 2006 12 10.1109/ICDCS.2006.80 (Pubitemid 46490972)
    • (2006) Proceedings - International Conference on Distributed Computing Systems , vol.2006 , pp. 1648799
    • Thomas Schwarz, S.J.1    Miller, E.L.2
  • 40
    • 0000369806 scopus 로고
    • Some applications of Rabin's fingerprinting method
    • New York, NY, USA Springer
    • Broder A., Some applications of Rabin's fingerprinting method. Sequences II 1993 New York, NY, USA Springer 143 152
    • (1993) Sequences II , pp. 143-152
    • Broder, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.