메뉴 건너뛰기




Volumn 8, Issue 1, 2015, Pages 92-106

Panda: Public auditing for shared data with efficient user revocation in the cloud

Author keywords

cloud computing; Public auditing; shared data; user revocation

Indexed keywords

CLOUD COMPUTING; NETWORK SECURITY;

EID: 84922828826     PISSN: 19391374     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSC.2013.2295611     Document Type: Article
Times cited : (285)

References (36)
  • 1
    • 84883057189 scopus 로고    scopus 로고
    • Public auditing for shared data with efficient user revocation in the cloud
    • B. Wang, B. Li, and H. Li. Public Auditing for Shared Data with Efficient User Revocation in the Cloud. Proc. IEEE INFOCOM: 2904-2912, 2013
    • (2013) Proc. IEEE INFOCOM , pp. 2904-2912
    • Wang, B.1    Li, B.2    Li, H.3
  • 7
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • C. Wang, Q. Wang, K. Ren, and W. Lou. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. Proc. IEEE INFOCOM: 525-533, 2010
    • (2010) Proc. IEEE INFOCOM , pp. 525-533
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 9
    • 84861957968 scopus 로고    scopus 로고
    • Towards secure and dependable storage services in cloud computing
    • Jan
    • C. Wang, Q. Wang, K. Ren, and W. Lou. Towards Secure and Dependable Storage Services in Cloud Computing. IEEE Trans. Services Computing 5, no. 2: 220-232, Jan. 2012
    • (2012) IEEE Trans. Services Computing , vol.5 , Issue.2 , pp. 220-232
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 11
    • 84861630520 scopus 로고    scopus 로고
    • Lt codes-based secure and reliable cloud storage service
    • N. Cao, S. Yu, Z. Yang, W. Lou, and Y.T. Hou. LT Codes-Based Secure and Reliable Cloud Storage Service. Proc. IEEE INFOCOM: 693-701, 2012
    • (2012) Proc. IEEE INFOCOM , pp. 693-701
    • Cao, N.1    Yu, S.2    Yang, Z.3    Lou, W.4    Hou, Y.T.5
  • 13
    • 84890471117 scopus 로고    scopus 로고
    • Proxy provable data possession in public clouds
    • Oct.-Dec
    • H. Wang. Proxy Provable Data Possession in Public Clouds. IEEE Trans. Services Computing 6, no. 4: 551-559, Oct.-Dec. 2013
    • (2013) IEEE Trans. Services Computing , vol.6 , Issue.4 , pp. 551-559
    • Wang, H.1
  • 14
    • 84866761388 scopus 로고    scopus 로고
    • Oruta: Privacy-preserving public auditing for shared data in the cloud
    • B. Wang, B. Li, and H. Li. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud. Proc. IEEE CLOUD: 295-302, 2012
    • (2012) Proc. IEEE CLOUD , pp. 295-302
    • Wang, B.1    Li, B.2    Li, H.3
  • 18
    • 0018545449 scopus 로고
    • How to share a secret
    • Nov
    • A. Shamir. How to Share a Secret. Comm. ACM. 22(11): 612-613, Nov. 1979
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 19
    • 84891354182 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for shared cloud data supporting group dynamics
    • June
    • B. Wang, H. Li, and M. Li. Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics. Proc. IEEE Int-l Conf. Comm. (ICC-13): 1946-1950, June 2013
    • (2013) Proc. IEEE Int-l Conf. Comm. (ICC-13 , pp. 1946-1950
    • Wang, B.1    Li, H.2    Li., M.3
  • 21
    • 79960878565 scopus 로고    scopus 로고
    • Findu: Private-preserving personal profile matching in mobile social networks
    • M. Li, N. Cao, S. Yu, and W. Lou. FindU: Private-Preserving Personal Profile Matching in Mobile Social Networks. Proc. IEEE INFOCOM: 2435-2443, 2011
    • (2011) Proc. IEEE INFOCOM , pp. 2435-2443
    • Li, M.1    Cao, N.2    Yu, S.3    Lou, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.