메뉴 건너뛰기




Volumn 58, Issue 4, 2015, Pages 823-830

On indistinguishability in remote data integrity checking

Author keywords

cloud storage; data integrity; data privacy; witness indistinguishability

Indexed keywords

DIGITAL STORAGE;

EID: 84905221667     PISSN: 00104620     EISSN: 14602067     Source Type: Journal    
DOI: 10.1093/comjnl/bxt137     Document Type: Article
Times cited : (33)

References (17)
  • 1
    • 77954695824 scopus 로고    scopus 로고
    • (accessed April 1, 2013)
    • Cloud Security Alliance. (2010) Top threats to cloud computing. https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf. (accessed April 1, 2013).
    • (2010) Top Threats to Cloud Computing
  • 3
    • 84902475228 scopus 로고    scopus 로고
    • Remote integrity checking
    • Jajodia, S. and Strous, L. (eds), Lausanne, Switzerland, November 13-14, Springer, Berlin
    • Deswarte, Y., Quisquater, J.J. and Saidane, A. (2003) Remote integrity checking. In Jajodia, S. and Strous, L. (eds), Proc. IICIS 2004, Lausanne, Switzerland, November 13-14, Vol. 140, pp. 1-11. Springer, Berlin.
    • (2003) Proc. IICIS 2004 , vol.140 , pp. 1-11
    • Deswarte, Y.1    Quisquater, J.J.2    Saidane, A.3
  • 5
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing
    • Backes, M. and Ning, P. (eds), Saint-Malo, France, September 21-23, Lecture Notes in Computer Science 5789, Springer, Berlin
    • Wang, Q., Wang, C., Li, J., Ren, K. and Lou, W. (2009) Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. In Backes, M. and Ning, P. (eds), Proc. ESORICS2009, Saint-Malo, France, September 21-23, Lecture Notes in Computer Science 5789, pp. 355-370. Springer, Berlin.
    • (2009) Proc. ESORICS2009 , pp. 355-370
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 6
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • Mandyam, G., Westphal, C., Chuah, M.C., Cohen, R. and Xue, G. (eds), San Diego, CA, March 14-19, 2010, IEEE Computer Society
    • Wang, C., Wang, Q., Ren, K. and Lou, W. (2010) Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In Mandyam, G., Westphal, C., Chuah, M.C., Cohen, R. and Xue, G. (eds), Proc. IEEE INFOCOM 2010, San Diego, CA, March 14-19, 2010, pp. 525-533, IEEE Computer Society.
    • (2010) Proc. IEEE INFOCOM 2010 , pp. 525-533
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 7
    • 79953294892 scopus 로고    scopus 로고
    • Enabling public audibility and data dynamics for storage security in cloud computing
    • Wang, Q., Wang, C., Ren, K., Lou, W. and Li, J. (2011) Enabling public audibility and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst., 22, 847-859.
    • (2011) IEEE Trans. Parallel Distrib. Syst. , vol.22 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Ren, K.3    Lou, W.4    Li, J.5
  • 8
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • Pieprzyk, J. (eds), Melbourne, Australia, Lecture Notes in Computer Science, Springer, Berlin
    • Shacham, H. and Waters, B. (2008) Compact Proofs of Retrievability. In Pieprzyk, J. (eds), Proc. ASIACRYPT 2008, Melbourne, Australia, Lecture Notes in Computer Science, Vol. 5350, pp. 90-107. Springer, Berlin.
    • (2008) Proc. ASIACRYPT 2008 , vol.5350 , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 9
    • 74049103479 scopus 로고    scopus 로고
    • Proofs of retrievability for large files
    • Ning, P., De Capitani di Vimercati, S. and Syverson, P.F. (eds), Alexandria, VA, USA, October 29-November 2, ACM
    • Juels, A. and Pors, B.S.K. Jr. (2007) Proofs of Retrievability for Large Files. In Ning, P., De Capitani di Vimercati, S. and Syverson, P.F. (eds), Proc. CCS 2007, Alexandria, VA, USA, October 29-November 2, pp. 584-597. ACM.
    • (2007) Proc. CCS 2007 , pp. 584-597
    • Juels, A.1    Pors, B.S.K.2
  • 10
    • 77954843911 scopus 로고    scopus 로고
    • Toward publicly auditable secure cloud data storage services
    • Wang, C., Ren, K., Lou, W. and Li, J. (2010) Toward publicly auditable secure cloud data storage services. IEEE Network, 24, 19-24.
    • (2010) IEEE Network , vol.24 , pp. 19-24
    • Wang, C.1    Ren, K.2    Lou, W.3    Li, J.4
  • 11
    • 84861959172 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for secure cloud storage
    • Wang, C., Chow, S.S., Wang, Q., Ren, K. and Lou, W. (2013) Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput., 62, 362-375.
    • (2013) IEEE Trans. Comput. , vol.62 , pp. 362-375
    • Wang, C.1    Chow, S.S.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 12
    • 84983104598 scopus 로고
    • On defining proofs of knowledge
    • Brickell, E.F. (eds), Santa Barbara, CA, USA, August 16-20, Lecture Notes in Computer Science, Springer, Berlin
    • Bellare, M. and Goldreich, O. (1992) On Defining Proofs of Knowledge. In Brickell, E.F. (eds), Proc. CRYPTO 1992, Santa Barbara, CA, USA, August 16-20, Lecture Notes in Computer Science, Vol. 740, pp. 390-420. Springer, Berlin.
    • (1992) Proc. CRYPTO 1992 , vol.740 , pp. 390-420
    • Bellare, M.1    Goldreich, O.2
  • 14
    • 85016272824 scopus 로고    scopus 로고
    • Auditing to keep online storage services honest
    • Hunt, G.C. (eds), San Diego, CA, USA, May, USENIX Association, CA, USA
    • Shah, M.A., Baker, M.J., Mogul, C. and Swaminathan, R. (2007) Auditing to Keep Online Storage Services Honest. In Hunt, G.C. (eds), Proc. HotOS 2007, San Diego, CA, USA, May, pp. 1-6. USENIX Association, CA, USA.
    • (2007) Proc. HotOS 2007 , pp. 1-6
    • Shah, M.A.1    Baker, M.J.2    Mogul, C.3    Swaminathan, R.4
  • 15
    • 44449140946 scopus 로고    scopus 로고
    • Efficient non-interactive proof systems for bilinear groups
    • Smart, N.P. (eds), Istanbul, Turkey, April 13-17, Lecture Notes in Computer Science 4965, Springer, Berlin
    • Groth, J. and Sahai, A. (2008) Efficient Non-Interactive Proof Systems for Bilinear Groups. In Smart, N.P. (eds), Proc. EUROCRYPT 2008, Istanbul, Turkey, April 13-17, Lecture Notes in Computer Science 4965, pp. 415-432. Springer, Berlin.
    • (2008) Proc. EUROCRYPT 2008 , pp. 415-432
    • Groth, J.1    Sahai, A.2
  • 16
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • Boneh, D., Lynn, B. and Shacham, H.(2004) Short signatures from the weil pairing. J. Cryptology, 17, 297-319.
    • (2004) J. Cryptology , vol.17 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 17
    • 84920380941 scopus 로고
    • Protocols for public key cryptosystems
    • Oakland, CA, USA, April 14-16, IEEE Computer Society
    • Merkle, R.C. (1980) Protocols for Public Key Cryptosystems. In Proc. IEEE Symp. Security and Privacy 1980, Oakland, CA, USA, April 14-16, pp. 122-134. IEEE Computer Society.
    • (1980) Proc. IEEE Symp. Security and Privacy 1980 , pp. 122-134
    • Merkle, R.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.