메뉴 건너뛰기




Volumn 113, Issue , 2016, Pages 130-139

Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability

Author keywords

Cloud storage; Identity traceability; Public auditing

Indexed keywords

DIGITAL STORAGE; DISTRIBUTED COMPUTER SYSTEMS;

EID: 84962382590     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2015.11.044     Document Type: Article
Times cited : (124)

References (36)
  • 3
    • 84921889973 scopus 로고    scopus 로고
    • Provable multicopy dynamic data possession in cloud computing systems
    • A.F. Barsoum, M.A. Hasan Provable multicopy dynamic data possession in cloud computing systems IEEE Trans. Inf. Forens. Secur. 10 3 2015 485 497
    • (2015) IEEE Trans. Inf. Forens. Secur. , vol.10 , Issue.3 , pp. 485-497
    • Barsoum, A.F.1    Hasan, M.A.2
  • 4
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • Advances in Cryptology-ASIACTYPT 2001, Springer Heidelberg
    • D. Boneh, B. Lynn, H. Shacham Short signatures from the weil pairing Advances in Cryptology-ASIACTYPT 2001, LNCS vol. 2248 2001 Springer Heidelberg 514 532
    • (2001) LNCS , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 8
    • 47849089563 scopus 로고    scopus 로고
    • Demonstrating data possession and uncheatable data transfer
    • ePrint archive
    • D.L.G. Fillo, P.S.L.M. Baretto Demonstrating data possession and uncheatable data transfer IACR Cryptol. 2006 ePrint archive http://eprint.iacr.org/2006/150
    • (2006) IACR Cryptol.
    • Fillo, D.L.G.1    Baretto, P.S.L.M.2
  • 10
    • 84897148119 scopus 로고    scopus 로고
    • Identity-based secure distributed data storage schemes
    • J. Han, W. Susilo, Y. Mu Identity-based secure distributed data storage schemes IEEE Trans. Comput. 63 4 2014 941 953
    • (2014) IEEE Trans. Comput. , vol.63 , Issue.4 , pp. 941-953
    • Han, J.1    Susilo, W.2    Mu, Y.3
  • 14
    • 78649290366 scopus 로고    scopus 로고
    • The NIST definition of cloud computing
    • P. Mell, T. Grance The NIST definition of cloud computing Communications of the ACM 53 6 2011 50
    • (2011) Communications of the ACM , vol.53 , Issue.6 , pp. 50
    • Mell, P.1    Grance, T.2
  • 15
    • 84879747636 scopus 로고    scopus 로고
    • accessed 06.10.2015
    • Miller, R. 2010. Amazon addresses EC2 power outages, online at http://www.datacenterknowledge.com/archives/2010/05/10/amazon-addresses-ec2-power-outages/ (accessed 06.10.2015).
    • (2010) Amazon Addresses EC2 Power Outages, Online
    • Miller, R.1
  • 16
    • 84928106743 scopus 로고    scopus 로고
    • Mutual verifiable provable data auditing in public cloud storage
    • Y. Ren, J. Shen, J. Wang, J. Han, S. Lee Mutual verifiable provable data auditing in public cloud storage J. Internet Technol. 16 2 2015 317 323
    • (2015) J. Internet Technol. , vol.16 , Issue.2 , pp. 317-323
    • Ren, Y.1    Shen, J.2    Wang, J.3    Han, J.4    Lee, S.5
  • 18
    • 84945431187 scopus 로고    scopus 로고
    • Dynamic remote data auditing for securing big data storage in cloud computing
    • Corrected Proof, Available online 10 September 2105
    • M. Sookhak, A. Gania, M.K. Khanb, R. Buyyac Dynamic remote data auditing for securing big data storage in cloud computing Inf. Sci. 2015 10.1016/j.ins.2015.09.004 Corrected Proof, Available online 10 September 2105
    • (2015) Inf. Sci.
    • Sookhak, M.1    Gania, A.2    Khanb, M.K.3    Buyyac, R.4
  • 19
    • 84901607854 scopus 로고    scopus 로고
    • A review on remote data auditing in single cloud server: Taxonomy and open issues
    • M. Sookhak, H. Talebian, E. Ahmed A review on remote data auditing in single cloud server: taxonomy and open issues J. Netw. Comput. Appl. 43 2014 121 141
    • (2014) J. Netw. Comput. Appl. , vol.43 , pp. 121-141
    • Sookhak, M.1    Talebian, H.2    Ahmed, E.3
  • 20
    • 84883057189 scopus 로고    scopus 로고
    • Public auditing for shared data with efficient user revocation in the cloud
    • B. Wang, B. Li, H. Li Public auditing for shared data with efficient user revocation in the cloud IEEE Infocom 8 1 2013 2904 2912
    • (2013) IEEE Infocom , vol.8 , Issue.1 , pp. 2904-2912
    • Wang, B.1    Li, B.2    Li, H.3
  • 21
    • 84922271700 scopus 로고    scopus 로고
    • Oruta: Privacy-preserving public auditing for shared data in the cloud
    • B. Wang, B. Li, H. Li Oruta: privacy-preserving public auditing for shared data in the cloud IEEE Trans. Cloud Comput. 2 1 2014 43 56
    • (2014) IEEE Trans. Cloud Comput. , vol.2 , Issue.1 , pp. 43-56
    • Wang, B.1    Li, B.2    Li, H.3
  • 23
    • 84861959172 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for secure cloud storage
    • C. Wang, S. Chow, Q. Wang, K. Ren, W. Lou Privacy-preserving public auditing for secure cloud storage IEEE Trans. Comput. 62 2 2013 362 375
    • (2013) IEEE Trans. Comput. , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 24
    • 84890471117 scopus 로고    scopus 로고
    • Proxy provable data possession in public clouds
    • H. Wang Proxy provable data possession in public clouds IEEE Trans. Serv. Comput. 6 4 2013 551 558
    • (2013) IEEE Trans. Serv. Comput. , vol.6 , Issue.4 , pp. 551-558
    • Wang, H.1
  • 25
    • 79953294892 scopus 로고    scopus 로고
    • Enabling public auditability and data dynamics for storage security in cloud computing
    • Q. Wang, C. Wang, K. Ren, W. Lou, J. Li Enabling public auditability and data dynamics for storage security in cloud computing IEEE Trans. Parallel and Distrib. Syst. 22 5 2011 847 859
    • (2011) IEEE Trans. Parallel and Distrib. Syst. , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Ren, K.3    Lou, W.4    Li, J.5
  • 26
    • 84961733854 scopus 로고    scopus 로고
    • accessed 06.10.2015
    • Wikipedia, 2014 celebrity photo hack, https://en.wikipedia.org/wiki/2014-celebrity-photo-hack (accessed 06.10.2015).
    • 2014 Celebrity Photo Hack
  • 27
    • 84858284080 scopus 로고    scopus 로고
    • Data storage auditing service in cloud computing: Challenges, methods and opportunities
    • K. Yang, X. Jia Data storage auditing service in cloud computing: challenges, methods and opportunities World Wide Web-Internet and Web Inf. Syst. 15 4 2012 409 428
    • (2012) World Wide Web-Internet and Web Inf. Syst. , vol.15 , Issue.4 , pp. 409-428
    • Yang, K.1    Jia, X.2
  • 28
    • 84911416889 scopus 로고    scopus 로고
    • A hybrid solution for privacy preserving medical data sharing in the cloud environment
    • J. Yang, J. Li, Y. Niu A hybrid solution for privacy preserving medical data sharing in the cloud environment Future Gener. Comput. Syst. 43-44 2015 74 86
    • (2015) Future Gener. Comput. Syst. , vol.43-44 , pp. 74-86
    • Yang, J.1    Li, J.2    Niu, Y.3
  • 30
    • 84949654521 scopus 로고    scopus 로고
    • IRIBE: Intrusion-resilient identity-based encryption
    • J. Yu, R. Hao, H.W. Zhao, M.L. Shu, J.X. Fan IRIBE: Intrusion-resilient identity-based encryption Inf. Sci. 329 2016 90 104
    • (2016) Inf. Sci. , vol.329 , pp. 90-104
    • Yu, J.1    Hao, R.2    Zhao, H.W.3    Shu, M.L.4    Fan, J.X.5
  • 31
    • 84901836903 scopus 로고    scopus 로고
    • One forward-secure signature scheme using bilinear maps and its applications
    • J. Yu, F.Y. Kong, X.G. Cheng, R. Hao, G.W. Li One forward-secure signature scheme using bilinear maps and its applications Inf. Sci. 279 2014 60 76
    • (2014) Inf. Sci. , vol.279 , pp. 60-76
    • Yu, J.1    Kong, F.Y.2    Cheng, X.G.3    Hao, R.4    Li, G.W.5
  • 32
    • 84888362150 scopus 로고    scopus 로고
    • On the security of auditing mechanisms for secure cloud storage
    • Y. Yu, L. Niu, G. Yang, Y. Mu, W. Susilo On the security of auditing mechanisms for secure cloud storage Future Gener. Comput. Syst. 30 2014 127 132
    • (2014) Future Gener. Comput. Syst. , vol.30 , pp. 127-132
    • Yu, Y.1    Niu, L.2    Yang, G.3    Mu, Y.4    Susilo, W.5
  • 33
    • 84938057153 scopus 로고    scopus 로고
    • Remote data possession checking with enhanced security for cloud storage
    • Y. Yu, Y. Zhang, J. Ni, M. Au, L. Chen, H. Liu Remote data possession checking with enhanced security for cloud storage Future Gener. Comput. Syst. 52 2015 77 85
    • (2015) Future Gener. Comput. Syst. , vol.52 , pp. 77-85
    • Yu, Y.1    Zhang, Y.2    Ni, J.3    Au, M.4    Chen, L.5    Liu, H.6
  • 34
    • 84961773105 scopus 로고    scopus 로고
    • On the security of a public auditing mechanism for shared cloud data service
    • Y. Yu, J. Ni, M. Au, Y. Mu, B. Wang, H. Li On the security of a public auditing mechanism for shared cloud data service IEEE Trans. Serv. Comput. 2015 10.1109/TSC.2014.2355201
    • (2015) IEEE Trans. Serv. Comput.
    • Yu, Y.1    Ni, J.2    Au, M.3    Mu, Y.4    Wang, B.5    Li, H.6
  • 35
    • 84934283890 scopus 로고    scopus 로고
    • Public integrity auditing for dynamic data sharing with multiuser modification
    • J. Yuan, S. Yu Public integrity auditing for dynamic data sharing with multiuser modification IEEE Trans. Inf. Forensics and Secur. 10 8 2015 1717 1726
    • (2015) IEEE Trans. Inf. Forensics and Secur. , vol.10 , Issue.8 , pp. 1717-1726
    • Yuan, J.1    Yu, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.