메뉴 건너뛰기




Volumn , Issue , 2014, Pages 831-843

Outsourced proofs of retrievability

Author keywords

Auditor based model; Cloud security; Proofs of retrievability

Indexed keywords

DATA PRIVACY; SECURITY OF DATA;

EID: 84910598312     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2660267.2660310     Document Type: Conference Paper
Times cited : (125)

References (38)
  • 3
    • 38149054118 scopus 로고    scopus 로고
    • PBC Library. http://crypto.stanford.edu/pbc/, 2007.
    • (2007) PBC Library
  • 4
    • 84889035860 scopus 로고    scopus 로고
    • Jerasure. https://github.com/tsuraan/Jerasure, 2008.
    • (2008) Jerasure
  • 13
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • BONEH, D., LYNN, B., AND SHACHAM, H. Short signatures from the weil pairing. J. Cryptology 17, 4 (2004), 297-319.
    • (2004) J. Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 15
    • 74049136395 scopus 로고    scopus 로고
    • Proofs of retrievability: Theory and implementation
    • BOWERS, K. D., JUELS, A., AND OPREA, A. Proofs of retrievability: theory and implementation. In CCSW (2009), pp. 43-54.
    • (2009) CCSW , pp. 43-54
    • Bowers, K.D.1    Juels, A.2    Oprea, A.3
  • 17
    • 84883411598 scopus 로고    scopus 로고
    • Dynamic proofs of retrievability via oblivious RAM
    • CASH, D., KÜPÇÜ, A., AND WICHS, D. Dynamic Proofs of Retrievability via Oblivious RAM. In EUROCRYPT (2013), pp. 279-295.
    • (2013) EUROCRYPT , pp. 279-295
    • Cash, D.1    Küpçü, A.2    Wichs, D.3
  • 19
    • 51849117195 scopus 로고    scopus 로고
    • MR-PDP: Multiple-replica provable data possession
    • CURTMOLA, R., KHAN, O., BURNS, R. C., AND ATENIESE, G. MR-PDP: Multiple-Replica Provable Data Possession. In ICDCS (2008), pp. 411-420.
    • (2008) ICDCS , pp. 411-420
    • Curtmola, R.1    Khan, O.2    Burns, R.C.3    Ateniese, G.4
  • 22
    • 70350681128 scopus 로고    scopus 로고
    • Proofs of retrievability via hardness amplification
    • DODIS, Y., VADHAN, S. P., AND WICHS, D. Proofs of Retrievability via Hardness Amplification. In TCC (2009), pp. 109-127.
    • (2009) TCC , pp. 109-127
    • Dodis, Y.1    Vadhan, S.P.2    Wichs, D.3
  • 27
    • 84910663706 scopus 로고    scopus 로고
    • NETEM. NetEm, the Linux Foundation. Website, 2009. Available online at http://www.linuxfoundation.org/collaborate/workgroups/networking/netem.
    • (2009)
    • NETEM1
  • 29
    • 84871949666 scopus 로고    scopus 로고
    • Boosting efficiency and security in proof of ownership for deduplication
    • H. Y. Youm and Y. Won, Eds., ACM
    • PIETRO, R. D., AND SORNIOTTI, A. Boosting efficiency and security in proof of ownership for deduplication. In ASIACCS (2012), H. Y. Youm and Y. Won, Eds., ACM, pp. 81-82.
    • (2012) ASIACCS , pp. 81-82
    • Pietro, R.D.1    Sorniotti, A.2
  • 31
    • 84856188619 scopus 로고    scopus 로고
    • An analysis of anonymity in the bitcoin system
    • REID, F., AND HARRIGAN, M. An Analysis of Anonymity in the Bitcoin System. CoRR (2011).
    • (2011) CoRR
    • Reid, F.1    Harrigan, M.2
  • 34
    • 85032873931 scopus 로고
    • Efficient identification and signatures for smart cards (abstract)
    • J.-J. Quisquater and J. Vandewalle, Eds., vol. 434 of Lecture Notes in Computer Science, Springer
    • SCHNORR, C.-P. Efficient identification and signatures for smart cards (abstract). In EUROCRYPT (1989), J.-J. Quisquater and J. Vandewalle, Eds., vol. 434 of Lecture Notes in Computer Science, Springer, pp. 688-689.
    • (1989) EUROCRYPT , pp. 688-689
    • Schnorr, C.-P.1
  • 35
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • SHACHAM, H., AND WATERS, B. Compact Proofs of Retrievability. In ASIACRYPT (2008), pp. 90-107.
    • (2008) ASIACRYPT , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 36
    • 81055144591 scopus 로고    scopus 로고
    • Delegable provable data possession for remote data in the clouds
    • S. Qing, W. Susilo, G. Wang, and D. Liu, Eds., vol. 7043 of Lecture Notes in Computer Science, Springer
    • SHEN, S.-T., AND TZENG, W.-G. Delegable provable data possession for remote data in the clouds. In ICICS (2011), S. Qing, W. Susilo, G. Wang, and D. Liu, Eds., vol. 7043 of Lecture Notes in Computer Science, Springer, pp. 93-111.
    • (2011) ICICS , pp. 93-111
    • Shen, S.-T.1    Tzeng, W.-G.2
  • 38
    • 84869808633 scopus 로고    scopus 로고
    • Lost: Location based storage
    • T. Yu, S. Capkun, and S. Kamara, Eds., ACM
    • WATSON, G. J., SAFAVI-NAINI, R., ALIMOMENI, M., LOCASTO, M. E., AND NARAYAN, S. Lost: location based storage. In CCSW (2012), T. Yu, S. Capkun, and S. Kamara, Eds., ACM, pp. 59-70.
    • (2012) CCSW , pp. 59-70
    • Watson, G.J.1    Safavi-Naini, R.2    Alimomeni, M.3    Locasto, M.E.4    Narayan, S.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.