메뉴 건너뛰기




Volumn 47, Issue 4, 2015, Pages

Remote data auditing in cloud computing environments: A survey, taxonomy, and open issues

Author keywords

Cloud computing; Erasure coding; Network coding; Remote Data Auditing; Replication

Indexed keywords

CLOUD COMPUTING; CODES (SYMBOLS); DIGITAL STORAGE; MOBILE SECURITY; NETWORK CODING; PRINTING MACHINERY; SECURITY OF DATA; SURVEYS; TAXONOMIES;

EID: 84930646829     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/2764465     Document Type: Review
Times cited : (113)

References (132)
  • 1
    • 84878341131 scopus 로고    scopus 로고
    • Cloud monitoring: A survey
    • 2013
    • Giuseppe Aceto, Alessio Botta, Walter de Donato, and Antonio Pescap. 2013. Cloud monitoring: A survey. Computer Networks 57, 9(2013), 2093-2115.
    • (2013) Computer Networks , vol.57 , Issue.9 , pp. 2093-2115
    • Aceto, G.1    Botta, A.2    De Donato, W.3    Pescap, A.4
  • 13
    • 78650878673 scopus 로고    scopus 로고
    • The client and the cloud: Democratizing research computing
    • 2011
    • Roger Barga, Dennis Gannon, and Daniel Reed. 2011. The client and the cloud: Democratizing research computing. IEEE Internet Computing 15, 1(2011), 72-75.
    • (2011) IEEE Internet Computing , vol.15 , Issue.1 , pp. 72-75
    • Barga, R.1    Gannon, D.2    Reed, D.3
  • 14
    • 84863642638 scopus 로고    scopus 로고
    • Provable possession and replication of data over cloud servers
    • University of Waterloo, 2010
    • Ayad F. Barsoum and M. Anwar Hasan. 2010. Provable Possession and Replication of Data over Cloud Servers. Centre for Applied Cryptographic Research (CACR) Report 32, University of Waterloo, (2010), 1-36.
    • (2010) Centre for Applied Cryptographic Research (CACR) , pp. 1-36
    • Barsoum, A.F.1    Anwar Hasan, M.2
  • 15
    • 84874296531 scopus 로고    scopus 로고
    • On verifying dynamic multiple data copies over cloud servers
    • Ayad F. Barsoum and M. Anwar Hasan. 2011. On verifying dynamic multiple data copies over cloud servers. IACR Cryptology ePrint Archive 2011(2011), 447-476.
    • (2011) IACR Cryptology EPrint Archive , vol.2011 , Issue.2011 , pp. 447-476
    • Barsoum, A.F.1    Anwar Hasan, M.2
  • 16
    • 0029254192 scopus 로고
    • EVENODD: An efficient scheme for tolerating double disk failures in RAID architectures
    • 1995, 192-202
    • Mario Blaum, Jim Brady, Jehoshua Bruck, and Jai Menon. 1995. EVENODD: An efficient scheme for tolerating double disk failures in RAID architectures. IEEE Transactions on Computing 44, 2(1995), 192-202.
    • (1995) IEEE Transactions on Computing , vol.44 , pp. 2
    • Blaum, M.1    Brady, J.2    Bruck, J.3    Menon, J.4
  • 17
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • Springer, Book section 26
    • Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham. 2003. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. Lecture Notes in Computer Science, Vol. 2656. Springer, Book section 26, 416-432.
    • (2003) Lecture Notes in Computer Science , vol.2656 , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 20
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
    • 2009
    • Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal, James Broberg, and Ivona Brandic. 2009. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems 25, 6(2009), 599-616.
    • (2009) Future Generation Computer Systems , vol.25 , Issue.6 , pp. 599-616
    • Buyya, R.1    Yeo, C.S.2    Venugopal, S.3    Broberg, J.4    Brandic, I.5
  • 21
    • 84858158703 scopus 로고    scopus 로고
    • The Aneka platform and QoS-driven resource provisioning for elastic applications on hybrid Clouds
    • 2012
    • Rodrigo N. Calheiros, Christian Vecchiola, Dileban Karunamoorthy, and Rajkumar Buyya. 2012. The Aneka platform and QoS-driven resource provisioning for elastic applications on hybrid Clouds. Future Generation Computer Systems 28, 6(2012), 861-870.
    • (2012) Future Generation Computer Systems , vol.28 , Issue.6 , pp. 861-870
    • Calheiros, R.N.1    Vecchiola, C.2    Karunamoorthy, D.3    Buyya, R.4
  • 22
    • 4243180376 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • 2004
    • Ran Canetti, Oded Goldreich, and Shai Halevi. 2004. The random oracle methodology, revisited. Journal of the ACM 51, 4(2004), 557-594.
    • (2004) Journal of the ACM , vol.51 , Issue.4 , pp. 557-594
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 25
    • 84930686345 scopus 로고    scopus 로고
    • The Sidekick Cloud Disaster. Retrieved from http://www.bbc.co.uk/blogs/technology/2009/10/the-sidekick-cloud-disaster.html.
    • The Sidekick Cloud Disaster1
  • 28
    • 84897713013 scopus 로고    scopus 로고
    • Enabling data integrity protection in regenerating-codingbased cloud storage: Theory and implementation
    • Henry C. H. Chen and Patrick P. C. Lee. 2013. Enabling data integrity protection in regenerating-codingbased cloud storage: Theory and implementation. IEEE Transactions on Parallel and Distributed Systems 99(2013), 1-1.
    • (2013) IEEE Transactions on Parallel and Distributed Systems , vol.99 , Issue.2013 , pp. 1-1
    • Chen, H.C.H.1    Lee, P.P.C.2
  • 29
    • 84885645897 scopus 로고    scopus 로고
    • Using algebraic signatures to check data possession in cloud storage
    • 2013
    • Lanxiang Chen. 2013. Using algebraic signatures to check data possession in cloud storage. Future Generation Computer Systems 29, 7(2013), 1709-1715.
    • (2013) Future Generation Computer Systems , vol.29 , Issue.7 , pp. 1709-1715
    • Chen, L.1
  • 30
    • 84885662348 scopus 로고    scopus 로고
    • Data dynamics for remote data possession checking in cloud storage
    • 2013
    • Lanxiang Chen, Shuming Zhou, Xinyi Huang, and Li Xu. 2013. Data dynamics for remote data possession checking in cloud storage. Computers & Electrical Engineering 39, 7(2013), 2413-2424.
    • (2013) Computers & Electrical Engineering , vol.39 , Issue.7 , pp. 2413-2424
    • Chen, L.1    Zhou, S.2    Huang, X.3    Xu, L.4
  • 31
    • 33744479345 scopus 로고    scopus 로고
    • Freenet: A distributed anonymous information storage and retrieval system
    • Book section 4
    • Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. 2001. Freenet: ADistributed Anonymous Information Storage and Retrieval System. Lecture Notes in Computer Science, Vol. 2009. Book section 4, 46-66.
    • (2001) Lecture Notes in Computer Science , vol.2009 , pp. 46-66
    • Clarke, I.1    Sandberg, O.2    Wiley, B.3    Hong, T.W.4
  • 36
    • 79951957726 scopus 로고    scopus 로고
    • A survey on network codes for distributed storage
    • 2011
    • Alexandros G. Dimakis, Kannan Ramchandran, Yunnan Wu, and Suh Changho. 2011. A survey on network codes for distributed storage. Proceedings of the IEEE 99, 3(2011), 476-489.
    • (2011) Proceedings of the IEEE , vol.99 , Issue.3 , pp. 476-489
    • Dimakis, A.G.1    Ramchandran, K.2    Wu, Y.3    Changho, S.4
  • 38
    • 33645240198 scopus 로고    scopus 로고
    • The free haven project: Distributed anonymous storage service
    • Springer, Book section 5
    • Roger Dingledine, Michael J. Freedman, and David Molnar. 2001. The Free Haven Project: Distributed Anonymous Storage Service. Lecture Notes in Computer Science, Vol. 2009. Springer, Book section 5, 67-95.
    • (2001) Lecture Notes in Computer Science , vol.2009 , pp. 67-95
    • Dingledine, R.1    Freedman, M.J.2    Molnar, D.3
  • 41
    • 84879849228 scopus 로고    scopus 로고
    • Transparent, distributed, and replicated dynamic provable data possession
    • Mohammad Etemad and Alptekin Küpçü. 2013. Transparent, distributed, and replicated dynamic provable data possession. IACR Cryptology ePrint Archive 2013(2013), 225.
    • (2013) IACR Cryptology EPrint Archive , vol.2013 , Issue.2013 , pp. 225
    • Etemad, M.1    Küpçü, A.2
  • 46
    • 80052277144 scopus 로고    scopus 로고
    • Adding value to the network: Mobile operators experiments with Software-as - A-Service and Platform-as - A - Service models
    • 2011
    • Vânia Gonçalves and Pieter Ballon. 2011. Adding value to the network: Mobile operators experiments with Software-as-a-Service and Platform-as-a-Service models. Telematics and Informatics 28, 1(2011), 12-21.
    • (2011) Telematics and Informatics , vol.28 , Issue.1 , pp. 12-21
    • Gonçalves, V.1    Ballon, P.2
  • 47
    • 84901627921 scopus 로고    scopus 로고
    • Efficient simultaneous privately and publicly verifiable robust provable data possession from elliptic curves
    • 2013
    • Christian Hanser and Daniel Slamanig. 2013. Efficient simultaneous privately and publicly verifiable robust provable data possession from elliptic curves. IACR Cryptology ePrint Archive (2013), 392-406.
    • (2013) IACR Cryptology EPrint Archive , pp. 392-406
    • Hanser, C.1    Slamanig, D.2
  • 50
    • 84901933057 scopus 로고    scopus 로고
    • Security on distributed systems: Cloud security versus traditional IT
    • 2014
    • M. Azua Himmel and F. Grossman. 2014. Security on distributed systems: Cloud security versus traditional IT. IBM Journal of Research and Development 58, 1(2014), 31-313.
    • (2014) IBM Journal of Research and Development , vol.58 , Issue.1 , pp. 31-313
    • Azua Himmel, M.1    Grossman, F.2
  • 55
    • 84878887163 scopus 로고    scopus 로고
    • State-of - The-art research study for green cloud computing
    • 2013
    • Si-Yuan Jing, Shahzad Ali, Kun She, and Yi Zhong. 2013. State-of-the-art research study for green cloud computing. Journal of Supercomputing 65, 1(2013), 445-468.
    • (2013) Journal of Supercomputing , vol.65 , Issue.1 , pp. 445-468
    • Jing, S.-Y.1    Ali, S.2    She, K.3    Zhong, Y.4
  • 57
    • 84874109689 scopus 로고    scopus 로고
    • Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage
    • 2013, 34-46
    • Dongyoung Koo, Junbeom Hur, and Hyunsoo Yoon. 2013. Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Computers & Electrical Engineering 39, 1(2013), 34-46.
    • (2013) Computers & Electrical Engineering , vol.39 , pp. 1
    • Koo, D.1    Hur, J.2    Yoon, H.3
  • 60
    • 84883356637 scopus 로고    scopus 로고
    • Efficient cryptography for the next generation secure cloud
    • Retrieved from home.ku.edu.tr/~akupcu/papers/kupcu-phd.pdf
    • Alptekin Küpçü. 2010. Efficient Cryptography for the Next Generation Secure Cloud. Thesis. Retrieved from home.ku.edu.tr/~akupcu/papers/kupcu-phd.pdf.
    • (2010) Thesis
    • Küpçü, A.1
  • 62
    • 0025430451 scopus 로고
    • Scalable, secure, and highly available distributed file access
    • 1990
    • Satyanarayanan Mahadev. 1990. Scalable, secure, and highly available distributed file access. Computer 23, 5(1990), 9-18. DOI: http://dx.doi.org/10.1109/2.53351
    • (1990) Computer , vol.23 , Issue.5 , pp. 9-18
    • Mahadev, S.1
  • 65
    • 84861307113 scopus 로고    scopus 로고
    • The NIST definition of cloud computing (draft)
    • Peter Mell and Timothy Grance. 2011. The NIST definition of cloud computing (draft). NIST Special Publication 800(2011), 145.
    • (2011) NIST Special Publication , vol.800 , Issue.2011 , pp. 145
    • Mell, P.1    Grance, T.2
  • 66
    • 84920380941 scopus 로고
    • Protocols for public key cryptosystems
    • Oakland, CA, USA
    • R. C. Merkle. 1980. Protocols for public key cryptosystems. In IEEE Symposium on Security and Privacy. Oakland, CA, USA, 122-134.
    • (1980) IEEE Symposium on Security and Privacy , pp. 122-134
    • Merkle, R.C.1
  • 67
    • 84857732276 scopus 로고    scopus 로고
    • A study of practical deduplication
    • 2012
    • Dutch T. Meyer and William J. Bolosky. 2012. A study of practical deduplication. Transactions on Storage 7, 4(2012), 1-20. DOI: http://dx.doi.org/10.1145/2078861.2078864
    • (2012) Transactions on Storage , vol.7 , Issue.4 , pp. 1-20
    • Meyer, D.T.1    Bolosky, W.J.2
  • 68
    • 84879747636 scopus 로고    scopus 로고
    • Rich Miller. 2010. Amazon Addresses EC2 Power Outages. Retrieved from http://www.datacenterknowledge.com/archives/2010/05/10/amazon-addresses-ec2-power-outages/.
    • (2010) Amazon Addresses EC2 Power Outages
    • Miller, R.1
  • 69
    • 77956243270 scopus 로고    scopus 로고
    • DACO: A high-performance disk architecture designed specially for large-scale erasure-coded storage systems
    • 2010
    • Li Mingqiang and Shu Jiwu. 2010. DACO: A high-performance disk architecture designed specially for large-scale erasure-coded storage systems. IEEE Transations on Computers 59, 10(2010), 1350-1362.
    • (2010) IEEE Transations on Computers , vol.59 , Issue.10 , pp. 1350-1362
    • Mingqiang, L.1    Jiwu, S.2
  • 78
    • 13244269971 scopus 로고    scopus 로고
    • Note: Correction to the 1997 tutorial on Reed-Solomon coding
    • 2005
    • James S. Plank and Ying Ding. 2005. Note: Correction to the 1997 tutorial on Reed-Solomon coding. Software: Practice and Experience 35, 2(2005), 189-194. DOI: http://dx.doi.org/10.1002/spe.631
    • (2005) Software: Practice and Experience , vol.35 , Issue.2 , pp. 189-194
    • Plank, J.S.1    Ding, Y.2
  • 79
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing, and fault tolerance
    • 1989
    • Michael O. Rabin. 1989. Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the ACM 36, 2(1989), 335-348.
    • (1989) Journal of the ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.O.1
  • 81
    • 84874108116 scopus 로고    scopus 로고
    • Beyond lightning: A survey on security challenges in cloud computing
    • 2013
    • Chunming Rong, Son T. Nguyen, and Martin Gilje Jaatun. 2013. Beyond lightning: A survey on security challenges in cloud computing. Computers & Electrical Engineering 39, 1(2013), 47-54.
    • (2013) Computers & Electrical Engineering , vol.39 , Issue.1 , pp. 47-54
    • Rong, C.1    Nguyen, S.T.2    Jaatun, M.G.3
  • 83
    • 77954749319 scopus 로고    scopus 로고
    • Token-based cloud computing
    • Springer, Book section 30
    • Ahmad-Reza Sadeghi, Thomas Schneider, and Marcel Winandy. 2010. Token-Based Cloud Computing. Lecture Notes in Computer Science, Vol. 6101. Springer, Book section 30, 417-429.
    • (2010) Lecture Notes in Computer Science , vol.6101 , pp. 417-429
    • Sadeghi, A.1    Schneider, T.2    Winandy, M.3
  • 84
    • 84887447695 scopus 로고    scopus 로고
    • The family of Mapreduce and large-scale data processing systems
    • 2013
    • Sherif Sakr, Anna Liu, and Ayman G. Fayoumi. 2013. The family of Mapreduce and large-scale data processing systems. ACM Computer Surveys 46, 1(2013), 1-44.
    • (2013) ACM Computer Surveys , vol.46 , Issue.1 , pp. 1-44
    • Sakr, S.1    Liu, A.2    Fayoumi, A.G.3
  • 89
    • 58349118819 scopus 로고    scopus 로고
    • Compact Proofs of Retrievability
    • Springer, Book section 7
    • Hovav Shacham and Brent Waters. 2008. Compact Proofs of Retrievability. Lecture Notes in Computer Science, Vol. 5350. Springer, Book section 7, 90-107.
    • (2008) Lecture Notes in Computer Science , vol.5350 , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 92
    • 84867509247 scopus 로고    scopus 로고
    • A combined approach to ensure data security in cloud computing
    • 2012
    • Sandeep K. Sood. 2012. A combined approach to ensure data security in cloud computing. Journal of Network and Computer Applications 35, 6(2012), 1831-1838.
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.6 , pp. 1831-1838
    • Sood, S.K.1
  • 93
    • 84904635972 scopus 로고    scopus 로고
    • Towards dynamic remote data auditing in computational clouds
    • Mehdi Sookhak, Adnan Akhunzada, Abdullah Gani, Muhammad Khurram Khan, and Nor Badrul Anuar. 2014a. Towards dynamic remote data auditing in computational clouds. Scientific World Journal 2014(2014), 12. DOI: http://dx.doi.org/10.1155/2014/269357
    • (2014) Scientific World Journal , vol.2014 , Issue.2014 , pp. 12
    • Sookhak, M.1    Akhunzada, A.2    Gani, A.3    Khan, M.K.4    Anuar, N.B.5
  • 94
    • 84901607854 scopus 로고    scopus 로고
    • A review on remote data auditing in single cloud server: Taxonomy and open issues
    • Mehdi Sookhak, Hamid Talebian, Ejaz Ahmed, Abdullah Gani, and Muhammad Khurram Khan. 2014b. A review on remote data auditing in single cloud server: Taxonomy and open issues. Journal of Network and Computer Applications 43(2014), 121-141. DOI: http://dx.doi.org/10.1016/j.jnca.2014.04.011
    • (2014) Journal of Network and Computer Applications , vol.43 , Issue.2014 , pp. 121-141
    • Sookhak, M.1    Talebian, H.2    Ahmed, E.3    Gani, A.4    Khan, M.K.5
  • 97
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • 2011
    • S. Subashini and V. Kavitha. 2011. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34, 1(2011), 1-11. DOI: http://dx.doi.org/10.1016/j.jnca.2010.07.006
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 98
    • 0031540744 scopus 로고    scopus 로고
    • Frangipani: A scalable distributed file system
    • 1997
    • Chandramohan A. Thekkath, Timothy Mann, and Edward K. Lee. 1997. Frangipani: A scalable distributed file system. SIGOPS Operating Systems Review 31, 5(1997), 224-237.
    • (1997) SIGOPS Operating Systems Review , vol.31 , Issue.5 , pp. 224-237
    • Thekkath, C.A.1    Mann, T.2    Lee, E.K.3
  • 99
    • 35048847465 scopus 로고    scopus 로고
    • A measurement-based traffic profile of the eDonkey filesharing service
    • Springer, Book section 2
    • Kurt Tutschku. 2004. A Measurement-Based Traffic Profile of the eDonkey Filesharing Service. Lecture Notes in Computer Science, Vol. 3015. Springer, Book section 2, 12-21. DOI: http://dx.doi.org/10.1007/978-3-540-24668-8-2
    • (2004) Lecture Notes in Computer Science , vol.3015 , pp. 12-21
    • Tutschku, K.1
  • 100
    • 79751493181 scopus 로고    scopus 로고
    • Locking the sky: A survey on IaaS cloud security
    • 2011
    • Luism Vaquero, Luis Rodero-Merino, and Daniel Morán. 2011. Locking the sky: A survey on IaaS cloud security. Computing 91, 1(2011), 93-118.
    • (2011) Computing , vol.91 , Issue.1 , pp. 93-118
    • Vaquero, L.1    Rodero-Merino, L.2    Morán, D.3
  • 102
    • 33745767064 scopus 로고    scopus 로고
    • A taxonomy of data grids for distributed data sharing, management, and processing
    • 2006
    • Srikumar Venugopal, Rajkumar Buyya, and Kotagiri Ramamohanarao. 2006. A taxonomy of data grids for distributed data sharing, management, and processing. ACM Computer Surveys 38, 1(2006), 3.
    • (2006) ACM Computer Surveys , vol.38 , Issue.1 , pp. 3
    • Venugopal, S.1    Buyya, R.2    Ramamohanarao, K.3
  • 103
    • 73849139655 scopus 로고    scopus 로고
    • Cumulus: Filesystem backup to the cloud
    • 2009
    • Michael Vrable, Stefan Savage, and Geoffrey M. Voelker. 2009. Cumulus: Filesystem backup to the cloud. Transactions on Storage 5, 4(2009), 1-28.
    • (2009) Transactions on Storage , vol.5 , Issue.4 , pp. 1-28
    • Vrable, M.1    Savage, S.2    Voelker, G.M.3
  • 105
    • 84861959172 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for secure cloud storage
    • 2013
    • Cong Wang, S. S. M. Chow, Qian Wang, Kui Ren, and Wenjing Lou. 2013. Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers 62, 2(2013), 362-375.
    • (2013) IEEE Transactions on Computers , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.S.M.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 106
    • 77954843911 scopus 로고    scopus 로고
    • Toward publicly auditable secure cloud data storage services
    • 2010
    • Cong Wang, Kui Ren, Wenjing Lou, and Jin Li. 2010. Toward publicly auditable secure cloud data storage services. IEEE Network 24, 4(2010), 19-24.
    • (2010) IEEE Network , vol.24 , Issue.4 , pp. 19-24
    • Wang, C.1    Ren, K.2    Lou, W.3    Li, J.4
  • 107
    • 84861957968 scopus 로고    scopus 로고
    • Toward secure and dependable storage services in cloud computing
    • 2012
    • Cong Wang, Qian Wang, Kui Ren, Ning Cao, and Wenjing Lou. 2012. Toward secure and dependable storage services in cloud computing. IEEE Transactions on Services Computing, 5, 2(2012), 220-232.
    • (2012) IEEE Transactions on Services Computing , vol.5 , Issue.2 , pp. 220-232
    • Wang, C.1    Wang, Q.2    Ren, K.3    Cao, N.4    Lou, W.5
  • 108
    • 84891798354 scopus 로고    scopus 로고
    • Proxy provable data possession in public clouds
    • Huaqun Wang. 2012. Proxy provable data possession in public clouds. IEEE Transactions on Services Computing, 99(2012), 1-1.
    • (2012) IEEE Transactions on Services Computing , vol.99 , Issue.2012 , pp. 1-1
    • Wang, H.1
  • 109
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing
    • Qian Wang, Cong Wang, Jin Li, Kui Ren, and Wenjing Lou. 2009. Enabling public verifiability and data dynamics for storage security in cloud computing. Proceedings of Computer Security 5789(2009), 355-370.
    • (2009) Proceedings of Computer Security , vol.5789 , Issue.2009 , pp. 355-370
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 110
    • 79953294892 scopus 로고    scopus 로고
    • Enabling public auditability and data dynamics for storage security in cloud computing
    • 2011
    • Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li. 2011. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems 22, 5(2011), 847-859.
    • (2011) IEEE Transactions on Parallel and Distributed Systems , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Ren, K.3    Lou, W.4    Li, J.5
  • 112
    • 84947278873 scopus 로고    scopus 로고
    • Erasure coding vs. Replication: A quantitative comparison
    • Springer, Book section 31
    • Hakim Weatherspoon and John D. Kubiatowicz. 2002. Erasure Coding Vs. Replication: A Quantitative Comparison. Lecture Notes in Computer Science, Vol. 2429. Springer, Book section 31, 328-337.
    • (2002) Lecture Notes in Computer Science , vol.2429 , pp. 328-337
    • Weatherspoon, H.1    Kubiatowicz, J.D.2
  • 113
    • 84889087663 scopus 로고    scopus 로고
    • Security and privacy for storage and computation in cloud computing
    • Lifei Wei, Haojin Zhu, Zhenfu Cao, Xiaolei Dong, Weiwei Jia, Yunlu Chen, and Athanasios V. Vasilakos. 2014. Security and privacy for storage and computation in cloud computing. Information Sciences 258(2014), 371-386.
    • (2014) Information Sciences , vol.258 , Issue.2014 , pp. 371-386
    • Wei, L.1    Zhu, H.2    Cao, Z.3    Dong, X.4    Jia, W.5    Chen, Y.6    Vasilakos, A.V.7
  • 114
    • 84877686015 scopus 로고    scopus 로고
    • Chun Wesley. 2011. What Is Google App Engine? Retrieved from https://ep2012.europython. eu/conference/talks/google-app-engine-best-practices-latest-features.
    • (2011) What Is Google App Engine?
    • Wesley, C.1
  • 117
    • 84857361398 scopus 로고    scopus 로고
    • Multiple-file remote data checking for cloud storage
    • 2012
    • Da Xiao, Yan Yang, Wenbin Yao, Chunhua Wu, Jianyi Liu, and Yixian Yang. 2012. Multiple-file remote data checking for cloud storage. Computers & Security 31, 2(2012), 192-205. DOI: http://dx.doi.org/10.1016/j.cose.2011.12.005
    • (2012) Computers & Security , vol.31 , Issue.2 , pp. 192-205
    • Xiao, D.1    Yang, Y.2    Yao, W.3    Wu, C.4    Liu, J.5    Yang, Y.6
  • 120
    • 84881080693 scopus 로고    scopus 로고
    • An efficient and secure dynamic auditing protocol for data storage in cloud computing
    • Kan Yang and Xiaohua Jia. 2012. An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transactions on Parallel and Distributed Systems PP, 99(2012), 1717-1726.
    • (2012) IEEE Transactions on Parallel and Distributed Systems PP , vol.99 , Issue.2012 , pp. 1717-1726
    • Yang, K.1    Jia, X.2
  • 123
    • 84878475706 scopus 로고    scopus 로고
    • Proofs of retrievability with public verifiability and constant communication cost in cloud
    • ACM, Hangzhou, China
    • Jiawei Yuan and Shucheng Yu. 2013a. Proofs of retrievability with public verifiability and constant communication cost in cloud. In Proceedings of the International Workshop on Security in Cloud Computing. ACM, Hangzhou, China, 19-26.
    • (2013) Proceedings of the International Workshop on Security in Cloud Computing , pp. 19-26
    • Yuan, J.1    Yu, S.2
  • 124
    • 84901643136 scopus 로고    scopus 로고
    • Secure and constant cost public cloud storage auditing with deduplication
    • Jiawei Yuan and Shucheng Yu. 2013b. Secure and constant cost public cloud storage auditing with deduplication. IACR Cryptology ePrint Archive 2013(2013), 149.
    • (2013) IACR Cryptology EPrint Archive , vol.2013 , Issue.2013 , pp. 149
    • Yuan, J.1    Yu, S.2
  • 130
  • 132
    • 79959557055 scopus 로고    scopus 로고
    • Addressing cloud computing security issues
    • 2012
    • Dimitrios Zissis and Dimitrios Lekkas. 2012. Addressing cloud computing security issues. Future Generation Computer Systems 28, 3(2012), 583-592.
    • (2012) Future Generation Computer Systems , vol.28 , Issue.3 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.