메뉴 건너뛰기




Volumn 380, Issue , 2017, Pages 101-116

Dynamic remote data auditing for securing big data storage in cloud computing

Author keywords

Big data storage; Cloud computing; Data dynamic; Data integrity; Remote data auditing

Indexed keywords

CLOUD COMPUTING; COSTS; DATA STORAGE EQUIPMENT; DATA STRUCTURES; DIGITAL STORAGE; DISTRIBUTED COMPUTER SYSTEMS; PRINTING MACHINERY;

EID: 84945431187     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2015.09.004     Document Type: Article
Times cited : (159)

References (67)
  • 3
    • 84924368818 scopus 로고    scopus 로고
    • Security in cloud computing: opportunities and challenges
    • [3] Ali, M., Khan, S.U., Vasilakos, A.V., Security in cloud computing: opportunities and challenges. Inf. Sci. 305 (2015), 357–383.
    • (2015) Inf. Sci. , vol.305 , pp. 357-383
    • Ali, M.1    Khan, S.U.2    Vasilakos, A.V.3
  • 5
    • 84893233677 scopus 로고    scopus 로고
    • The 15 Worst Data Security Breaches of the 21st Century
    • [5] T. Armerding, The 15 Worst Data Security Breaches of the 21st Century, in: COS Security and Risk, csoonline, 2012.
    • (2012) COS Security and Risk, csoonline
    • Armerding, T.1
  • 9
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • Springer Berlin Heidelberg
    • [9] Boneh, D., Gentry, C., Lynn, B., Shacham, H., Aggregate and verifiably encrypted signatures from bilinear maps. Advances in Cryptology (EUROCRYPT), 2003, Springer, Berlin Heidelberg, 416–432.
    • (2003) Advances in Cryptology (EUROCRYPT) , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 11
    • 84922828826 scopus 로고    scopus 로고
    • Panda: public auditing for shared data with efficient user revocation in the cloud
    • [11] Boyang, W., Baochun, L., Hui, L., Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8 (2015), 92–106.
    • (2015) IEEE Trans. Serv. Comput. , vol.8 , pp. 92-106
    • Boyang, W.1    Baochun, L.2    Hui, L.3
  • 12
    • 0000369806 scopus 로고
    • Some applications of Rabin's fingerprinting method
    • Springer New York
    • [12] Broder, A., Some applications of Rabin's fingerprinting method. Sequences II, 1993, Springer, New York, 143–152.
    • (1993) Sequences II , pp. 143-152
    • Broder, A.1
  • 13
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility
    • [13] Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I., Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25 (2009), 599–616.
    • (2009) Future Gener. Comput. Syst. , vol.25 , pp. 599-616
    • Buyya, R.1    Yeo, C.S.2    Venugopal, S.3    Broberg, J.4    Brandic, I.5
  • 15
    • 84873952327 scopus 로고    scopus 로고
    • Algebraic (Trapdoor) one-way functions and their applications
    • A. Sahai Springer Berlin Heidelberg
    • [15] Catalano, D., Fiore, D., Gennaro, R., Vamvourellis, K., Algebraic (Trapdoor) one-way functions and their applications. Sahai, A., (eds.) Theory of Cryptography, 2013, Springer, Berlin Heidelberg, 680–699.
    • (2013) Theory of Cryptography , pp. 680-699
    • Catalano, D.1    Fiore, D.2    Gennaro, R.3    Vamvourellis, K.4
  • 17
    • 77954843911 scopus 로고    scopus 로고
    • Toward publicly auditable secure cloud data storage services
    • [17] Cong, W., Kui, R., Wenjing, L., Jin, L., Toward publicly auditable secure cloud data storage services. IEEE Netw. 24 (2010), 19–24.
    • (2010) IEEE Netw. , vol.24 , pp. 19-24
    • Cong, W.1    Kui, R.2    Wenjing, L.3    Jin, L.4
  • 21
    • 84891627095 scopus 로고    scopus 로고
    • Managing performance overhead of virtual machines in cloud computing: a survey, state of the art, and future directions
    • [21] Fei, X., Fangming, L., Hai, J., Vasilakos, A.V., Managing performance overhead of virtual machines in cloud computing: a survey, state of the art, and future directions. Proc. IEEE 102 (2014), 11–31.
    • (2014) Proc. IEEE , vol.102 , pp. 11-31
    • Fei, X.1    Fangming, L.2    Hai, J.3    Vasilakos, A.V.4
  • 22
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • [22] Goldreich, O., Ostrovsky, R., Software protection and simulation on oblivious RAMs. J. ACM 43 (1996), 431–473.
    • (1996) J. ACM , vol.43 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 24
    • 84860389117 scopus 로고    scopus 로고
    • Efficient strong designated verifier signature schemes without random oracle or with non-delegatability
    • [24] Huang, Q., Yang, G., Wong, D., Susilo, W., Efficient strong designated verifier signature schemes without random oracle or with non-delegatability. Int. J. Inf. Secur. 10 (2011), 373–385.
    • (2011) Int. J. Inf. Secur. , vol.10 , pp. 373-385
    • Huang, Q.1    Yang, G.2    Wong, D.3    Susilo, W.4
  • 27
    • 84998615008 scopus 로고    scopus 로고
    • Public integrity auditing for shared dynamic cloud data with group user revocation
    • [27] Jiang, T., Chen, X., Ma, J., Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans. Comput. PP (2015), 1–12.
    • (2015) IEEE Trans. Comput. , vol.PP , pp. 1-12
    • Jiang, T.1    Chen, X.2    Ma, J.3
  • 29
    • 79960627456 scopus 로고    scopus 로고
    • Survey on routing in data centers: insights and future directions
    • [29] Kai, C., Chengchen, H., Xin, Z., Kai, Z., Yan, C., Vasilakos, A.V., Survey on routing in data centers: insights and future directions. IEEE Netw. 25 (2011), 6–10.
    • (2011) IEEE Netw. , vol.25 , pp. 6-10
    • Kai, C.1    Chengchen, H.2    Xin, Z.3    Kai, Z.4    Yan, C.5    Vasilakos, A.V.6
  • 30
    • 84901987724 scopus 로고    scopus 로고
    • Incremental proxy re-encryption scheme for mobile cloud computing environment
    • [30] Khan, A., Kiah, M.L.M., Madani, S., Ali, M., Khan, A., Shamshirband, S., Incremental proxy re-encryption scheme for mobile cloud computing environment. J Supercomput. 68 (2014), 624–651.
    • (2014) J Supercomput. , vol.68 , pp. 624-651
    • Khan, A.1    Kiah, M.L.M.2    Madani, S.3    Ali, M.4    Khan, A.5    Shamshirband, S.6
  • 31
    • 84871533728 scopus 로고    scopus 로고
    • Proof of possession for cloud storage via Lagrangian interpolation techniques
    • L. Xu E. Bertino Y. Mu Springer Berlin Heidelberg
    • [31] Krzywiecki, Ł., Kutyłowski, M., Proof of possession for cloud storage via Lagrangian interpolation techniques. Xu, L., Bertino, E., Mu, Y., (eds.) Network and System Security, 2012, Springer, Berlin Heidelberg, 305–319.
    • (2012) Network and System Security , pp. 305-319
    • Krzywiecki, Ł.1    Kutyłowski, M.2
  • 32
    • 84962857221 scopus 로고    scopus 로고
    • Secure auditing and deduplicating data in cloud
    • [32] Li, J., Li, J., Xie, D., Cai, Z., Secure auditing and deduplicating data in cloud. IEEE Trans. Comput. PP (2015), 1–11.
    • (2015) IEEE Trans. Comput. , vol.PP , pp. 1-11
    • Li, J.1    Li, J.2    Xie, D.3    Cai, Z.4
  • 39
    • 0025436383 scopus 로고
    • Skip lists: a probabilistic alternative to balanced trees
    • [39] Pugh, W., Skip lists: a probabilistic alternative to balanced trees. Commun. ACM 33 (1990), 668–676.
    • (1990) Commun. ACM , vol.33 , pp. 668-676
    • Pugh, W.1
  • 43
    • 77952962466 scopus 로고    scopus 로고
    • Finite field arithmetic for cryptography
    • [43] Savas, x., Ko, E., x00E, C.K., Finite field arithmetic for cryptography. IEEE Circuits Syst. Mag. 10 (2010), 40–56.
    • (2010) IEEE Circuits Syst. Mag. , vol.10 , pp. 40-56
    • Savas, X.1    Ko, E.2    x00E, C.K.3
  • 46
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • Springer Berlin, Heidelberg
    • [46] Shacham, H., Waters, B., Compact proofs of retrievability. Advances in Cryptology (ASIACRYPT), 2008, Springer, Berlin, Heidelberg, 90–107.
    • (2008) Advances in Cryptology (ASIACRYPT) , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 47
    • 84888388073 scopus 로고    scopus 로고
    • An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique
    • [47] Shamshirband, S., Anuar, N.B., Kiah, M.L.M., Patel, A., An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique. Eng. Appl. Artif. Intell. 26 (2013), 2105–2127.
    • (2013) Eng. Appl. Artif. Intell. , vol.26 , pp. 2105-2127
    • Shamshirband, S.1    Anuar, N.B.2    Kiah, M.L.M.3    Patel, A.4
  • 48
    • 84930646829 scopus 로고    scopus 로고
    • Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues
    • [48] Sookhak, M., Gani, A., Talebian, H., Khan, S.U., Buyya, R., Zomaya, A.Y., Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues. ACM Comput. Surv. 47 (2015), 1–34.
    • (2015) ACM Comput. Surv. , vol.47 , pp. 1-34
    • Sookhak, M.1    Gani, A.2    Talebian, H.3    Khan, S.U.4    Buyya, R.5    Zomaya, A.Y.6
  • 49
    • 84901607854 scopus 로고    scopus 로고
    • A review on remote data auditing in single cloud server: taxonomy and open issues
    • [49] Sookhak, M., Talebian, H., Ahmed, E., Gani, A., Khan, M.K., A review on remote data auditing in single cloud server: taxonomy and open issues. J. Netw. Comput. Appl. 43 (2014), 121–141.
    • (2014) J. Netw. Comput. Appl. , vol.43 , pp. 121-141
    • Sookhak, M.1    Talebian, H.2    Ahmed, E.3    Gani, A.4    Khan, M.K.5
  • 51
    • 84861959172 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for secure cloud storage in cloud computing
    • [51] Wang, C., Chow, S., Wang, Q., Ren, K., Lou, W, Privacy-preserving public auditing for secure cloud storage in cloud computing. IEEE Trans. Comput. PP (2012), 1–14.
    • (2012) IEEE Trans. Comput. , vol.PP , pp. 1-14
    • Wang, C.1    Chow, S.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 52
    • 77954843911 scopus 로고    scopus 로고
    • Toward publicly auditable secure cloud data storage services
    • [52] Wang, C., Ren, K., Lou, W., Li, J., Toward publicly auditable secure cloud data storage services. IEEE Network 24 (2010), 19–24.
    • (2010) IEEE Network , vol.24 , pp. 19-24
    • Wang, C.1    Ren, K.2    Lou, W.3    Li, J.4
  • 53
    • 84861957968 scopus 로고    scopus 로고
    • Toward secure and dependable storage services in cloud computing
    • [53] Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W., Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 5 (2012), 220–232.
    • (2012) IEEE Trans. Serv. Comput. , vol.5 , pp. 220-232
    • Wang, C.1    Wang, Q.2    Ren, K.3    Cao, N.4    Lou, W.5
  • 54
    • 84891798354 scopus 로고    scopus 로고
    • Proxy provable data possession in public clouds
    • 1-1
    • [54] Wang, H., Proxy provable data possession in public clouds. IEEE Trans. Serv. Comput., PP, 2012 1-1.
    • (2012) IEEE Trans. Serv. Comput. , vol.PP
    • Wang, H.1
  • 55
    • 79953294892 scopus 로고    scopus 로고
    • Enabling public auditability and data dynamics for storage security in cloud computing
    • [55] Wang, Q.A., Wang, C., Ren, K., Lou, W.J., Li, J., Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distr. 22 (2011), 847–859.
    • (2011) IEEE Trans. Parallel Distr. , vol.22 , pp. 847-859
    • Wang, Q.A.1    Wang, C.2    Ren, K.3    Lou, W.J.4    Li, J.5
  • 56
    • 84898487969 scopus 로고    scopus 로고
    • A game-theoretic method of fair resource allocation for cloud computing services
    • [56] Wei, G., Vasilakos, A., Zheng, Y., Xiong, N., A game-theoretic method of fair resource allocation for cloud computing services. J. Supercomput. 54 (2010), 252–269.
    • (2010) J. Supercomput. , vol.54 , pp. 252-269
    • Wei, G.1    Vasilakos, A.2    Zheng, Y.3    Xiong, N.4
  • 57
    • 84889087663 scopus 로고    scopus 로고
    • Security and privacy for storage and computation in cloud computing
    • [57] Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V., Security and privacy for storage and computation in cloud computing. Inf. Sci. 258 (2014), 371–386.
    • (2014) Inf. Sci. , vol.258 , pp. 371-386
    • Wei, L.1    Zhu, H.2    Cao, Z.3    Dong, X.4    Jia, W.5    Chen, Y.6    Vasilakos, A.V.7
  • 61
    • 84881080693 scopus 로고    scopus 로고
    • An efficient and secure dynamic auditing protocol for data storage in cloud computing
    • [61] Yang, K., Jia, X., An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. PP (2012), 1717–1726.
    • (2012) IEEE Trans. Parallel Distrib. , vol.PP , pp. 1717-1726
    • Yang, K.1    Jia, X.2
  • 62
    • 84881080693 scopus 로고    scopus 로고
    • An efficient and secure dynamic auditing protocol for data storage in cloud computing
    • [62] Yang, K., Jia, X., An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. PP (2013), 1717–1726.
    • (2013) IEEE Trans. Parallel Distrib. , vol.PP , pp. 1717-1726
    • Yang, K.1    Jia, X.2
  • 64
    • 84934283890 scopus 로고    scopus 로고
    • Public integrity auditing for dynamic data sharing with multi-user modification
    • [64] Yuan, J., Yu, S., Public integrity auditing for dynamic data sharing with multi-user modification. IEEE Trans. Inf. Forensics Secur. PP (2015), 1717–1726.
    • (2015) IEEE Trans. Inf. Forensics Secur. , vol.PP , pp. 1717-1726
    • Yuan, J.1    Yu, S.2
  • 65
    • 35948963685 scopus 로고    scopus 로고
    • A novel ID-based designated verifier signature scheme
    • [65] Zhang, J., Mao, J., A novel ID-based designated verifier signature scheme. Inf. Sci. 178 (2008), 766–773.
    • (2008) Inf. Sci. , vol.178 , pp. 766-773
    • Zhang, J.1    Mao, J.2
  • 66
    • 84900355325 scopus 로고    scopus 로고
    • Efficient dynamic provable possession of remote data via update trees
    • [66] Y. Zhang, M. Blanton, Efficient dynamic provable possession of remote data via update trees, IACR Cryptology ePrint Archive, (2012) 291-291.
    • (2012) IACR Cryptology ePrint Archive , pp. 291-291
    • Zhang, Y.1    Blanton, M.2
  • 67
    • 84929268858 scopus 로고    scopus 로고
    • 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks
    • [67] Zhou, J., Cao, Z., Dong, X., Xiong, N., Vasilakos, A.V., 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf. Sci. 314 (2015), 255–276.
    • (2015) Inf. Sci. , vol.314 , pp. 255-276
    • Zhou, J.1    Cao, Z.2    Dong, X.3    Xiong, N.4    Vasilakos, A.V.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.