메뉴 건너뛰기




Volumn 15, Issue 9, 2014, Pages 794-804

NaEPASC: a novel and efficient public auditing scheme for cloud data

Author keywords

Cloud storage; Identity based aggregate signature; Public verification

Indexed keywords

AGGREGATES; AUTHENTICATION; PUBLIC KEY CRYPTOGRAPHY;

EID: 84920180137     PISSN: 18691951     EISSN: 1869196X     Source Type: Journal    
DOI: 10.1631/jzus.C1400045     Document Type: Article
Times cited : (25)

References (31)
  • 3
    • 79959823910 scopus 로고    scopus 로고
    • Remote data checking using provable data possession
    • Ateniese, G., Burns, R., Curtmola, R., et al., 2011. Remote data checking using provable data possession. ACM Trans. Inform. Syst. Secur., 14(1):1–12. [doi:10.1145/ 1952982.1952994]
    • (2011) ACM Trans. Inform. Syst. Secur. , vol.14 , Issue.1 , pp. 1-12
    • Ateniese, G.1    Burns, R.2    Curtmola, R.3
  • 4
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity-based encryption without random oracles
    • Boneh, D., Boyen, X., 2004. Efficient selective-ID secure identity-based encryption without random oracles. Advances in Cryptology-EUROCRYPT, p.223–238.
    • (2004) Advances in Cryptology-EUROCRYPT , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Boneh, D., Franklin, M., 2001. Identity-based encryption from the weil pairing. Advances in Cryptology-CRYPTO, p.213–229.
    • (2001) Advances in Cryptology-CRYPTO , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 6
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Boneh, D., Boyen, X., Goh, E.J., 2005. Hierarchical identity based encryption with constant size ciphertext. Advances in Cryptology-EUROCRYPT, p.440–456. [doi:10.1007/11426639_26]
    • (2005) Advances in Cryptology-EUROCRYPT , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.J.3
  • 10
  • 12
    • 79960900327 scopus 로고    scopus 로고
    • A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
    • Hao, Z., Zhong, S., Yu, N.H., 2011. A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng., 23(9):1432–1437. [doi:10.1109/TKDE.2011.62]
    • (2011) IEEE Trans. Knowl. Data Eng. , vol.23 , Issue.9 , pp. 1432-1437
    • Hao, Z.1    Zhong, S.2    Yu, N.H.3
  • 16
    • 84893408486 scopus 로고    scopus 로고
    • A study of incremental cryptography for security schemes in mobile cloud computing environments
    • Khan, A., Kiah, M.L.M., Khan, S.U., et al., 2013a. A study of incremental cryptography for security schemes in mobile cloud computing environments. IEEE Symp. on Wireless Technology and Applications, p.62–67. [doi:10.1109/ISWTA.2013.6688818]
    • (2013) IEEE Symp. on Wireless Technology and Applications , pp. 62-67
    • Khan, A.1    Kiah, M.L.M.2    Khan, S.U.3
  • 17
    • 84894666247 scopus 로고    scopus 로고
    • A survey of mobile cloud computing application models
    • Khan, A., Othman, M., Madani, S.A., et al., 2013b. A survey of mobile cloud computing application models. IEEE Commun. Surv. Tutor., 16(1):393–413. [doi:10.1109/SURV.2013.062613.00160]
    • (2013) IEEE Commun. Surv. Tutor. , vol.16 , Issue.1 , pp. 393-413
    • Khan, A.1    Othman, M.2    Madani, S.A.3
  • 22
    • 84878998883 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • Shacham, H., Waters, B., 2013. Compact proofs of retrievability. J. Cryptol., 26(3):442–483. [doi:10.1007/s00145-012-9129-2]
    • (2013) J. Cryptol. , vol.26 , Issue.3 , pp. 442-483
    • Shacham, H.1    Waters, B.2
  • 23
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Shamir, A., 1985. Identity-based cryptosystems and signature schemes. Advances in Cryptology-ASIACRYPT, p.47–53. [doi:10.1007/3-540-39568-7_5]
    • (1985) Advances in Cryptology-ASIACRYPT , pp. 47-53
    • Shamir, A.1
  • 24
    • 70449569012 scopus 로고    scopus 로고
    • Ensuring data storage security in cloud computing
    • Wang, C., Wang, Q., Ren, K., et al., 2009. Ensuring data storage security in cloud computing. 17th Int. Workshop on Quality of Service, p.1–9. [doi:10.1109/IWQoS.2009.5201385]
    • (2009) 17th Int. Workshop on Quality of Service , pp. 1-9
    • Wang, C.1    Wang, Q.2    Ren, K.3
  • 25
    • 77953295132 scopus 로고    scopus 로고
    • Privacypreserving public auditing for data storage security in cloud computing
    • Wang, C., Wang, Q., Ren, K., et al., 2010. Privacypreserving public auditing for data storage security in cloud computing. Proc. IEEE INFOCOM, p.1–9. [doi:10.1109/INFCOM.2010.5462173]
    • (2010) Proc. IEEE INFOCOM , pp. 1-9
    • Wang, C.1    Wang, Q.2    Ren, K.3
  • 26
    • 84861957968 scopus 로고    scopus 로고
    • Toward secure and dependable storage services in cloud computing
    • Wang, C., Wang, Q., Ren, K., et al., 2012. Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput., 5(2):220–232. [doi:10.1109/TSC.2011.24]
    • (2012) IEEE Trans. Serv. Comput. , vol.5 , Issue.2 , pp. 220-232
    • Wang, C.1    Wang, Q.2    Ren, K.3
  • 27
    • 84861959172 scopus 로고    scopus 로고
    • Privacypreserving public auditing for secure cloud storage
    • Wang, C., Chow, S., Wang, Q., et al., 2013. Privacypreserving public auditing for secure cloud storage. IEEE Trans. Comput., 62(2):362–375. [doi:10.1109/TC.2011.245]
    • (2013) IEEE Trans. Comput. , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.2    Wang, Q.3
  • 28
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing
    • Wang, Q., Wang, C., Li, J., et al., 2009. Enabling public verifiability and data dynamics for storage security in cloud computing. Computer Security-ESORICS, p.355–370. [doi:10.1007/978-3-642-04444-1_22]
    • (2009) Computer Security-ESORICS , pp. 355-370
    • Wang, Q.1    Wang, C.2    Li, J.3
  • 29
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Waters, B., 2005. Efficient identity-based encryption without random oracles. Advances in Cryptology-EUROCRYPT, p.114–127. [doi:10.1007/11426639_7]
    • (2005) Advances in Cryptology-EUROCRYPT , pp. 114-127
    • Waters, B.1
  • 31
    • 79960836433 scopus 로고    scopus 로고
    • Zero-knowledge proofs of retrievability
    • Zhu, Y., Wang, H.X., Hu, Z.X., et al., 2011b. Zero-knowledge proofs of retrievability. Sci. China Inform. Sci., 54(8):1608–1617. [doi:10.1007/s11432-011-4293-9]
    • (2011) Sci. China Inform. Sci. , vol.54 , Issue.8 , pp. 1608-1617
    • Zhu, Y.1    Wang, H.X.2    Hu, Z.X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.