메뉴 건너뛰기




Volumn 8, Issue 14, 2015, Pages 2457-2468

Provable ownership of files in deduplication cloud storage

Author keywords

Cloud storage; Deduplication; Provable ownership; Spot checking

Indexed keywords

COMPUTER NETWORKS; INFORMATION SYSTEMS;

EID: 84939445947     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.784     Document Type: Article
Times cited : (27)

References (18)
  • 1
    • 84939438474 scopus 로고    scopus 로고
    • Understanding data de-duplication ratios. SNIA, February . Available from
    • Dutch M, Freeman L. Understanding data de-duplication ratios. SNIA, February 2009. Available from: http://www.snia.org/.
    • (2009)
    • Dutch, M.1    Freeman, L.2
  • 4
    • 84939440047 scopus 로고    scopus 로고
    • Dropbox Cloud Service. Available from
    • Dropbox Cloud Service. Available from: https://www.dropbox.com.
  • 5
    • 84863932631 scopus 로고    scopus 로고
    • Dark clouds on the horizon: using cloud storage as attack vector and online slack space
    • USENIX Association: Berkeley, CA, USA
    • Mulazzani M, Schrittwieser S, Leithner M, Huber M, Weippl E. Dark clouds on the horizon: using cloud storage as attack vector and online slack space. In USENIX Security. USENIX Association: Berkeley, CA, USA, 2011; 5-15.
    • (2011) USENIX Security , pp. 5-15
    • Mulazzani, M.1    Schrittwieser, S.2    Leithner, M.3    Huber, M.4    Weippl, E.5
  • 6
    • 74049103479 scopus 로고    scopus 로고
    • PoRs: proofs of retrievability for large files
    • ACM
    • Juels A, Kaliski BS, Jr. PoRs: proofs of retrievability for large files. In ACM CCS '07. ACM, 2007; 584-597.
    • (2007) ACM CCS '07 , pp. 584-597
    • Juels, A.1    Kaliski, B.S.2
  • 7
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • Springer-Verlag
    • Shacham H, Waters B. Compact proofs of retrievability. In ASIACRYPT '08. Springer-Verlag, 2008; 90-107.
    • (2008) ASIACRYPT '08 , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 8
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing
    • Springer-Verlag
    • Wang Q, Wang C, Li J, Ren K, Lou W. Enabling public verifiability and data dynamics for storage security in cloud computing. In ESORICS'09. Springer-Verlag, 2009; 355-370.
    • (2009) ESORICS'09 , pp. 355-370
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 9
    • 74049102823 scopus 로고    scopus 로고
    • Provable data possession at untrusted stores
    • ACM
    • Ateniese G, Burns R, Curtmola R, et al. Provable data possession at untrusted stores. In ACM CCS'07. ACM, 2007; 598-609.
    • (2007) ACM CCS'07 , pp. 598-609
    • Ateniese, G.1    Burns, R.2    Curtmola, R.3
  • 11
    • 0031640285 scopus 로고    scopus 로고
    • Spot-checkers, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, Dallas, TX, May 24-26
    • Ergün F, Kannan S, Ravi Kumar S, Rubinfeld R, Viswanathan M. Spot-checkers, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, Dallas, TX, May 24-26, 1998; 259-268.
    • (1998) , pp. 259-268
    • Ergün, F.1    Kannan, S.2    Ravi Kumar, S.3    Rubinfeld, R.4    Viswanathan, M.5
  • 12
    • 74049144464 scopus 로고    scopus 로고
    • Hail: a high-availability and integrity layer for cloud storage
    • ACM
    • Bowers K, Juels A, Opera A. Hail: a high-availability and integrity layer for cloud storage. In ACM CCS '09. ACM, 2009; 187-198.
    • (2009) ACM CCS '09 , pp. 187-198
    • Bowers, K.1    Juels, A.2    Opera, A.3
  • 13
    • 84939431099 scopus 로고    scopus 로고
    • Proofs of retrievability: theory and implementation. Cryptology ePrint Archive, Report 2008/175, Available from
    • Bowers K, Juels A, Oprea A. Proofs of retrievability: theory and implementation. Cryptology ePrint Archive, Report 2008/175, 2008. Available from: http://eprint.iacr.org/.
    • (2008)
    • Bowers, K.1    Juels, A.2    Oprea, A.3
  • 14
    • 51849117195 scopus 로고    scopus 로고
    • MR-PDP: Multiple-replica provable data possession, Proceedings of the ICDCS '08, Beijing, China
    • Curtmola R, Khan O, Burns R, Ateniese G. MR-PDP: Multiple-replica provable data possession, Proceedings of the ICDCS '08, Beijing, China, 2008; 411-420.
    • (2008) , pp. 411-420
    • Curtmola, R.1    Khan, O.2    Burns, R.3    Ateniese, G.4
  • 15
    • 67650314202 scopus 로고    scopus 로고
    • Hardware mechanisms for memory authentication: a survey of existing techniques and engines
    • IEEE Computer Society: Washington, DC, USA
    • Elbaz R, Champagne D, Gebotys C, Lee R, Potlapally N, Torres L. Hardware mechanisms for memory authentication: a survey of existing techniques and engines. In ToCS IV, LNCS. IEEE Computer Society: Washington, DC, USA, 2009; 1-22.
    • (2009) ToCS IV, LNCS , pp. 1-22
    • Elbaz, R.1    Champagne, D.2    Gebotys, C.3    Lee, R.4    Potlapally, N.5    Torres, L.6
  • 16
    • 84969346266 scopus 로고
    • A certified digital signature
    • Springer-Verlag, Inc.: New York, NY
    • Merkle R. A certified digital signature. In Proceedings on Advances in Cryptology, CRYPTO'89. Springer-Verlag, Inc.: New York, NY, 1989; 218-238.
    • (1989) Proceedings on Advances in Cryptology, CRYPTO'89 , pp. 218-238
    • Merkle, R.1
  • 17
    • 77951086610 scopus 로고    scopus 로고
    • Reed-Solomon codes for low power communications
    • Biard L, Noguet D. Reed-Solomon codes for low power communications. Journal of Communications 2008; 3(2): 13-21.
    • (2008) Journal of Communications , vol.3 , Issue.2 , pp. 13-21
    • Biard, L.1    Noguet, D.2
  • 18
    • 84939434982 scopus 로고    scopus 로고
    • Crypto++ Library, 5.6.1, January . Available from
    • Dai W. Crypto++ Library, 5.6.1, January 2011. Available from: http://www.cryptopp.com/.
    • (2011)
    • Dai, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.