메뉴 건너뛰기




Volumn 3, Issue , 2014, Pages

Survey on securing data storage in the cloud

Author keywords

Access control; Cloud computing; Confidentiality; Data availability; Data integrity; Data security; Searchable encryptions

Indexed keywords

ACCESS CONTROL; CLOUD COMPUTING; COMPUTER PRIVACY; NETWORK SECURITY; SECURITY OF DATA; SURVEYS;

EID: 84906857302     PISSN: None     EISSN: 20487703     Source Type: Journal    
DOI: 10.1017/ATSIP.2014.6     Document Type: Review
Times cited : (91)

References (103)
  • 4
    • 85040059988 scopus 로고    scopus 로고
    • Anatomy of a cloud storage infrastructure
    • Tim Jones, M.: Anatomy of a cloud storage infrastructure. Technical Report, IBM, 2010.
    • (2010) Technical Report, IBM
    • Tim Jones, M.1
  • 6
    • 84906848364 scopus 로고
    • Security architecture for open systems interconnection for CCITT applications
    • March
    • CCITT Recommendation X.800. Security architecture for open systems interconnection for CCITT applications. Technical Report, March 1991.
    • (1991) CCITT Recommendation X.800, Technical Report
  • 13
    • 23044531486 scopus 로고    scopus 로고
    • Homomorphic signature schemes
    • volume 2271 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg
    • Johnson, R.; Molnar, D.; Song, D.; Wagner, D.: Homomorphic signature schemes. In Topics in Cryptology CT-RSA 2002, volume 2271 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 2002, 204-245.
    • (2002) Topics in Cryptology CT-RSA 2002 , pp. 204-245
    • Johnson, R.1    Molnar, D.2    Song, D.3    Wagner, D.4
  • 16
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • volume 2248 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg
    • Boneh, D.; Lynn, B.; Shacham, H.: Short signatures from the weil pairing. In Advances in Cryptology ASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 2001, 514-532.
    • (2001) Advances in Cryptology ASIACRYPT 2001 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 17
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing
    • Berlin, Heidelberg, Springer-Verlag
    • Wang, Q.;Wang, C.; Li, J.; Ren, K.; Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In Proc. 14th Eur. Conf. on Research in Computer Security, ESORICS'09, Berlin, Heidelberg, 2009, 355-370, Springer-Verlag.
    • (2009) Proc. 14th Eur. Conf. on Research in Computer Security, ESORICS'09 , pp. 355-370
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 19
    • 84861959172 scopus 로고    scopus 로고
    • Privacypreserving public auditing for secure cloud storage
    • Wang, C.; Chow, S.S.M.; Wang, Q.; Ren, K.; Lou, W.: Privacypreserving public auditing for secure cloud storage. IEEE Trans. Comput., 62 (2) (2013), 362-375.
    • (2013) IEEE Trans. Comput. , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.S.M.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 20
    • 77954843911 scopus 로고    scopus 로고
    • Toward publicly auditable secure cloud data storage services
    • Wang, C.; Ren, K.; Lou, W.; Li, J.: Toward publicly auditable secure cloud data storage services. IEEE Netw., 24 (4) (2010), 19 -24.
    • (2010) IEEE Netw. , vol.24 , Issue.4 , pp. 19-24
    • Wang, C.1    Ren, K.2    Lou, W.3    Li, J.4
  • 21
    • 84861957968 scopus 로고    scopus 로고
    • Toward secure and dependable storage services in cloud computing
    • Wang, C.; Wang, Q.; Ren, K.; Cao, N.; Lou, W.: Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput., 5 (2) (2012), 220-232.
    • (2012) IEEE Trans. Serv. Comput. , vol.5 , Issue.2 , pp. 220-232
    • Wang, C.1    Wang, Q.2    Ren, K.3    Cao, N.4    Lou, W.5
  • 22
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • Piscataway, NJ, USA, IEEE Press
    • Wang, C.; Wang, Q.; Ren, K.; Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In Proc. 29th Conf. on Information Communications, INFOCOM'10, Piscataway, NJ, USA, 2010, 525-533, IEEE Press.
    • (2010) Proc. 29th Conf. on Information Communications, INFOCOM'10 , pp. 525-533
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 23
    • 79953294892 scopus 로고    scopus 로고
    • Enabling public auditability and data dynamics for storage security in cloud computing
    • Wang, Q.; Wang, C.; Ren, K.; Lou, W.; Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst., 22 (5) (2011), 847-859.
    • (2011) IEEE Trans. Parallel Distrib. Syst. , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Ren, K.3    Lou, W.4    Li, J.5
  • 25
    • 80055122520 scopus 로고    scopus 로고
    • Ensuring data storage security through a novel third party auditor scheme in cloud computing
    • September
    • Han, S.;Xing, J.: Ensuring data storage security through a novel third party auditor scheme in cloud computing. In 2011 IEEE Int. Conf. on Cloud Computing and Intelligence Systems (CCIS), September 2011, 264-268.
    • (2011) 2011 IEEE Int. Conf. on Cloud Computing and Intelligence Systems (CCIS) , pp. 264-268
    • Han, S.1    Xing, J.2
  • 26
    • 79960900327 scopus 로고    scopus 로고
    • A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
    • Hao, Z.; Zhong, S.; Yu, N.: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng., 23 (9) (2011), 1432-1437.
    • (2011) IEEE Trans. Knowl. Data Eng. , vol.23 , Issue.9 , pp. 1432-1437
    • Hao, Z.1    Zhong, S.2    Yu, N.3
  • 31
    • 84878998883 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • Shacham, H.; Waters, B.: Compact proofs of retrievability. J. Cryptol., 26 (3) (2013), 442-83.
    • (2013) J. Cryptol. , vol.26 , Issue.3 , pp. 442-483
    • Shacham, H.1    Waters, B.2
  • 33
    • 79959823910 scopus 로고    scopus 로고
    • Remote data checking using provable data possession
    • Ateniese, G. et al.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur., 14 (1) (2011), 121-134.
    • (2011) ACM Trans. Inf. Syst. Secur. , vol.14 , Issue.1 , pp. 121-134
    • Ateniese, G.1
  • 46
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
    • volume 6110 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg
    • Lewko, A.B.; Okamoto, T.; Sahai, A.; Takashima, K.; Waters, B.: Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In Advances in Cryptology EUROCRYPT 2010, volume 6110 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg, 2010, 62-91.
    • (2010) Advances in Cryptology EUROCRYPT 2010 , pp. 62-91
    • Lewko, A.B.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 47
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • volume 6571 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg
    • Waters, B.: Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In PublicKey Cryptography PKC 2010, volume 6571 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 2011, 53-70.
    • (2011) PublicKey Cryptography PKC 2010 , pp. 53-70
    • Waters, B.1
  • 48
    • 49049111604 scopus 로고    scopus 로고
    • Bounded ciphertext policy attribute based encryption
    • volume 5126 of Lecture Notes in Computer Science, Springer
    • Goyal, V.; Jain, A.; Pandey, O.; Sahai, A.: Bounded ciphertext policy attribute based encryption. In 35th Int. Colloq. Automata, Languages and Programming, 2008, volume 5126 of Lecture Notes in Computer Science, Springer, 2008, 579-591.
    • (2008) 35th Int. Colloq. Automata, Languages and Programming, 2008 , pp. 579-591
    • Goyal, V.1    Jain, A.2    Pandey, O.3    Sahai, A.4
  • 50
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • March
    • Yu, S.; Wang, C.; Ren, K.; Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In INFOCOM, 2010 Proc. IEEE, March 2010, 1-9.
    • (2010) INFOCOM, 2010 Proc. IEEE , pp. 1-9
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 51
    • 79956336417 scopus 로고    scopus 로고
    • Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems
    • Berlin, Heidelberg, Springer- Verlag
    • Zhao, F.; Nishide, T.; Sakurai, K.: Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems. In Proc. 7th Int. Conference on Information Security Practice and Experience, ISPEC'11, Berlin, Heidelberg, 2011, 83-97, Springer- Verlag.
    • (2011) Proc. 7th Int. Conference on Information Security Practice and Experience, ISPEC'11 , pp. 83-97
    • Zhao, F.1    Nishide, T.2    Sakurai, K.3
  • 52
    • 84865465739 scopus 로고    scopus 로고
    • Dynamic credentials and ciphertext delegation for attribute-based encryption
    • volume 7417 of Lecture Notes in Computer Science, Springer
    • Sahai, A.; Seyalioglu, H.; Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In Advances in Cryptology - CRYPTO 2012, volume 7417 of Lecture Notes in Computer Science, Springer, 2012, 199-217.
    • (2012) Advances in Cryptology - CRYPTO 2012 , pp. 199-217
    • Sahai, A.1    Seyalioglu, H.2    Waters, B.3
  • 54
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • volume 4392 of Lecture Notes in Computer Science, Springer
    • Chase, M.:Multi-authority attribute based encryption. In 4th Theory of Cryptography Conf., volume 4392 of Lecture Notes in Computer Science, Springer, 2007, 515-534.
    • (2007) 4th Theory of Cryptography Conf. , pp. 515-534
    • Chase, M.1
  • 56
    • 79957993008 scopus 로고    scopus 로고
    • Decentralizing attribute-based encryption
    • volume 6632 of Lecture Notes in Computer Science, Springer
    • Lewko, A.B.;Waters, B.: Decentralizing attribute-based encryption. In Advances in Cryptology - EUROCRYPT 2011, volume 6632 of Lecture Notes in Computer Science, Springer, 2011, 568-588.
    • (2011) Advances in Cryptology - EUROCRYPT 2011 , pp. 568-588
    • Lewko, A.B.1    Waters, B.2
  • 57
    • 84956993736 scopus 로고    scopus 로고
    • Role-based authorization constraints specification
    • Ahn, G.-J.; Sandhu, R.: Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur., 3 (2000), 207-226.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , pp. 207-226
    • Ahn, G.-J.1    Sandhu, R.2
  • 64
    • 80054995027 scopus 로고    scopus 로고
    • Provably secure role-based encryption with revocation mechanism
    • Zhu, Y.; Hu, H.; Ahn, G.-J.; Wang, H.; Wang, S.-B.: Provably secure role-based encryption with revocation mechanism. J. Comput. Sci. Technol., 26 (4) (2011), 697-710.
    • (2011) J. Comput. Sci. Technol. , vol.26 , Issue.4 , pp. 697-710
    • Zhu, Y.1    Hu, H.2    Ahn, G.-J.3    Wang, H.4    Wang, S.-B.5
  • 65
    • 80053516153 scopus 로고    scopus 로고
    • Enforcing role-based access control for secure data storage in the cloud
    • Zhou, L.; Varadharajan, V.; Hitchens, M.: Enforcing role-based access control for secure data storage in the cloud. Comput. J., 54 (10) (2011), 1675-1687.
    • (2011) Comput. J. , vol.54 , Issue.10 , pp. 1675-1687
    • Zhou, L.1    Varadharajan, V.2    Hitchens, M.3
  • 67
    • 77953350247 scopus 로고    scopus 로고
    • Adding attributes to rolebased access control
    • Richard Kuhn, D.; Coyne, E.J.;Weil, T.R.: Adding attributes to rolebased access control. Computer, 43 (6) (2010), 79-81.
    • (2010) Computer , vol.43 , Issue.6 , pp. 79-81
    • Richard Kuhn, D.1    Coyne, E.J.2    Weil, T.R.3
  • 68
    • 80052691797 scopus 로고    scopus 로고
    • A secure and efficient rolebased access policy towards cryptographic cloud storage
    • Berlin, Heidelberg, Springer-Verlag
    • Hong, C.; lv, Z.; Zhang, M.; Feng, D.: A secure and efficient rolebased access policy towards cryptographic cloud storage. In Proc. 12th Int. Conf. on Web-age Information Management, WAIM'11, Berlin, Heidelberg, 2011, 264-276, Springer-Verlag.
    • (2011) Proc. 12th Int. Conf. on Web-age Information Management, WAIM'11 , pp. 264-276
    • Hong, C.1    Lv, Z.2    Zhang, M.3    Feng, D.4
  • 69
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • volume 3027 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg
    • Boneh, D.; Di Crescenzo, G.; Ostrovsky, R.; Persiano, G.: Public key encryption with keyword search. In Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 2004, 506-522.
    • (2004) Advances in Cryptology - EUROCRYPT 2004 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 71
    • 77956137294 scopus 로고    scopus 로고
    • Cryptographic cloud storage
    • volume 6054 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg
    • Kamara, S.; Lauter, K.: Cryptographic cloud storage. In Financial Cryptography and Data Security, volume 6054 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 2010, 136-149.
    • (2010) Financial Cryptography and Data Security , pp. 136-149
    • Kamara, S.1    Lauter, K.2
  • 72
    • 43449138479 scopus 로고    scopus 로고
    • Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
    • Abdalla, M. et al.: Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. J. Cryptol., 21 (3) (2008), 350-391.
    • (2008) J. Cryptol. , vol.21 , Issue.3 , pp. 350-391
    • Abdalla, M.1
  • 74
    • 84883285558 scopus 로고    scopus 로고
    • Parallel and dynamic searchable symmetric encryption
    • Kamara, S.; Papamanthou, C.: Parallel and dynamic searchable symmetric encryption. In Financial Cryptography, 2013, 258-274.
    • (2013) Financial Cryptography , pp. 258-274
    • Kamara, S.1    Papamanthou, C.2
  • 76
    • 81255134906 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • Curtmola, R.; Garay, J.; Kamara, S.; Ostrovsky, R.: Searchable symmetric encryption: Improved definitions and efficient constructions. J. Comput. Secur., 19 (5) (2011), 895-934.
    • (2011) J. Comput. Secur. , vol.19 , Issue.5 , pp. 895-934
    • Curtmola, R.1    Garay, J.2    Kamara, S.3    Ostrovsky, R.4
  • 78
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • Wang, C.; Cao, N.; Ren, K.; Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst., 23 (8) (2012), 1467-1479.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.8 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.4
  • 80
    • 80052002672 scopus 로고    scopus 로고
    • Order-preserving encryption revisited: Improved security analysis and alternative solutions
    • Berlin, Heidelberg, Springer-Verlag
    • Boldyreva, A.; Chenette, N.; O'Neill, A.: Order-preserving encryption revisited: Improved security analysis and alternative solutions. In Proc. 31st Annual Conf. on Advances in Cryptology, CRYPTO'11, Berlin, Heidelberg, 2011, 578-595, Springer-Verlag.
    • (2011) Proc. 31st Annual Conf. on Advances in Cryptology, CRYPTO'11 , pp. 578-595
    • Boldyreva, A.1    Chenette, N.2    O'Neill, A.3
  • 81
    • 84925452156 scopus 로고    scopus 로고
    • Search-as-a-service: Outsourced search over outsourced storage
    • Singh, A.; Srivatsa, M.; Liu, L.: Search-as-a-service: Outsourced search over outsourced storage. ACM Trans. Web, 3 (2009), 131-133.
    • (2009) ACM Trans. Web , vol.3 , pp. 131-133
    • Singh, A.1    Srivatsa, M.2    Liu, L.3
  • 85
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • volume 1592 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology EUROCRYPT 99, volume 1592 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 1999, 223-238.
    • (1999) Advances in Cryptology EUROCRYPT 99 , pp. 223-238
    • Paillier, P.1
  • 87
    • 77954642756 scopus 로고    scopus 로고
    • Fully homomorphic encryption over the integers
    • volume 6110 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg
    • Van Dijk, M.;Gentry, C.;Halevi, S.;Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In Advances in Cryptology EUROCRYPT 2010, volume 6110 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 2010, 24-43.
    • (2010) Advances in Cryptology EUROCRYPT 2010 , pp. 24-43
    • Van Dijk, M.1    Gentry, C.2    Halevi, S.3    Vaikuntanathan, V.4
  • 88
    • 78650833995 scopus 로고    scopus 로고
    • Faster fully homomorphic encryption
    • volume 6477 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg
    • Stehle, D.; Steinfeld, R.: Faster fully homomorphic encryption. In Advances in Cryptology - ASIACRYPT 2010, volume 6477 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 2010, 377-394.
    • (2010) Advances in Cryptology - ASIACRYPT 2010 , pp. 377-394
    • Stehle, D.1    Steinfeld, R.2
  • 89
    • 80051986706 scopus 로고    scopus 로고
    • Fully homomorphic encryption from ring-IWE and security for key dependent messages
    • Berlin, Heidelberg, Springer-Verlag
    • Brakerski, Z.; Vaikuntanathan, V.: Fully homomorphic encryption from ring-IWE and security for key dependent messages. In Proc. 31st Annu. Conf. on Advances in Cryptology, CRYPTO'11, Berlin, Heidelberg, 2011, 505-524, Springer-Verlag.
    • (2011) Proc. 31st Annu. Conf. on Advances in Cryptology, CRYPTO'11 , pp. 505-524
    • Brakerski, Z.1    Vaikuntanathan, V.2
  • 90
    • 84891588259 scopus 로고    scopus 로고
    • On ideal lattices and learning with errors over rings
    • Lyubashevsky, V.; Peikert, C.; Regev, O.: On ideal lattices and learning with errors over rings. J. ACM, 60 (6) (2013), 431-435.
    • (2013) J. ACM , vol.60 , Issue.6 , pp. 431-435
    • Lyubashevsky, V.1    Peikert, C.2    Regev, O.3
  • 93
    • 79953192140 scopus 로고    scopus 로고
    • Homomorphic encryption: From private-key to public-key
    • volume 6597 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg
    • Rothblum, R.: Homomorphic encryption: From private-key to public-key. In Theory of Cryptography, volume 6597 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 2011, 219-234.
    • (2011) Theory of Cryptography , pp. 219-234
    • Rothblum, R.1
  • 94
    • 79955532534 scopus 로고    scopus 로고
    • Fully homomorphic encryptionwith relatively small key and ciphertext sizes
    • volume 6056 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg
    • Smart, N.;Vercauteren, F.: Fully homomorphic encryptionwith relatively small key and ciphertext sizes. In Public Key Cryptography PKC 2010, volume 6056 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 2010, 420-443.
    • (2010) Public Key Cryptography PKC 2010 , pp. 420-443
    • Smart, N.1    Vercauteren, F.2
  • 96
    • 74049138993 scopus 로고    scopus 로고
    • On protecting integrity and confidentiality of cryptographic file system for outsourced storage
    • New York, NY, USA
    • Yun, A.; Shi, C.; Kim, Y.: On protecting integrity and confidentiality of cryptographic file system for outsourced storage. In Proc. 2009 ACM Workshop on Cloud Computing Security, CCSW'09, NewYork, NY, USA, 2009, 67-76.
    • (2009) Proc. 2009 ACM Workshop on Cloud Computing Security, CCSW'09 , pp. 67-76
    • Yun, A.1    Shi, C.2    Kim, Y.3
  • 98
    • 84969931080 scopus 로고    scopus 로고
    • On the impossibility of cryptography alone for privacy-preserving cloud computing
    • Berkeley, CA, USA, USENIX Association
    • Van Dijk, M.; Juels, A.: On the impossibility of cryptography alone for privacy-preserving cloud computing. In Proc. 5th USENIX Conf. on Hot Topics in Security, HotSec'10, Berkeley, CA, USA, 2010. USENIX Association, 1-8.
    • (2010) Proc. 5th USENIX Conf. on Hot Topics in Security, HotSec'10 , pp. 1-8
    • Van Dijk, M.1    Juels, A.2
  • 100
    • 80455144683 scopus 로고    scopus 로고
    • Proactive failure management by integrated unsupervised and semi-supervised learning for dependable cloud systems
    • Washington, DC, USA
    • Guan, Q.; Zhang, Z.; Fu, S.: Proactive failure management by integrated unsupervised and semi-supervised learning for dependable cloud systems. In Proc. 2011 6th Int. Conf. on Availability, Reliability and Security, ARES '11, Washington, DC, USA, 2011, 83-90.
    • (2011) Proc. 2011 6th Int. Conf. on Availability, Reliability and Security, ARES '11 , pp. 83-90
    • Guan, Q.1    Zhang, Z.2    Fu, S.3
  • 101
  • 102
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing, and fault tolerance
    • Rabin, M.O.: Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM, 36 (2) (1989), 335-348.
    • (1989) J. ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.O.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.