-
1
-
-
77950347409
-
A view of cloud computing
-
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, M. Zaharia A view of cloud computing Commun. ACM 53 4 2010 50 58
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
74049102823
-
Provable data possession at untrusted stores
-
New York ACM Press
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song Provable data possession at untrusted stores Proceedings of the 14th ACM Conference on Computer and Communication Security New York 2007 ACM Press 598 609
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communication Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
3
-
-
84921889973
-
Provable multicopy dynamic data possession in cloud computing systems
-
A.F. Barsoum, M.A. Hasan Provable multicopy dynamic data possession in cloud computing systems IEEE Trans. Inf. Forens. Secur. 10 3 2015 485 497
-
(2015)
IEEE Trans. Inf. Forens. Secur.
, vol.10
, Issue.3
, pp. 485-497
-
-
Barsoum, A.F.1
Hasan, M.A.2
-
4
-
-
84946840347
-
Short signatures from the weil pairing
-
Advances in Cryptology-ASIACTYPT 2001, Springer Heidelberg
-
D. Boneh, B. Lynn, H. Shacham Short signatures from the weil pairing Advances in Cryptology-ASIACTYPT 2001, LNCS vol. 2248 2001 Springer Heidelberg 514 532
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
8
-
-
47849089563
-
Demonstrating data possession and uncheatable data transfer
-
ePrint archive
-
D.L.G. Fillo, P.S.L.M. Baretto Demonstrating data possession and uncheatable data transfer IACR Cryptol. 2006 ePrint archive http://eprint.iacr.org/2006/150
-
(2006)
IACR Cryptol.
-
-
Fillo, D.L.G.1
Baretto, P.S.L.M.2
-
9
-
-
84951288033
-
Symmetric-key based proofs of retrievability supporting public verification
-
Vienna, Austria
-
C. Guan, K. Ren, F. Zhang, F. Kerschbaum, J. Yu Symmetric-key based proofs of retrievability supporting public verification Proceedings of 20th European Symposium on Research in Computer Security, ESORICS '15 Vienna, Austria 2015
-
(2015)
Proceedings of 20th European Symposium on Research in Computer Security, ESORICS '15
-
-
Guan, C.1
Ren, K.2
Zhang, F.3
Kerschbaum, F.4
Yu, J.5
-
10
-
-
84897148119
-
Identity-based secure distributed data storage schemes
-
J. Han, W. Susilo, Y. Mu Identity-based secure distributed data storage schemes IEEE Trans. Comput. 63 4 2014 941 953
-
(2014)
IEEE Trans. Comput.
, vol.63
, Issue.4
, pp. 941-953
-
-
Han, J.1
Susilo, W.2
Mu, Y.3
-
14
-
-
78649290366
-
The NIST definition of cloud computing
-
P. Mell, T. Grance The NIST definition of cloud computing Communications of the ACM 53 6 2011 50
-
(2011)
Communications of the ACM
, vol.53
, Issue.6
, pp. 50
-
-
Mell, P.1
Grance, T.2
-
15
-
-
84879747636
-
-
accessed 06.10.2015
-
Miller, R. 2010. Amazon addresses EC2 power outages, online at http://www.datacenterknowledge.com/archives/2010/05/10/amazon-addresses-ec2-power-outages/ (accessed 06.10.2015).
-
(2010)
Amazon Addresses EC2 Power Outages, Online
-
-
Miller, R.1
-
16
-
-
84928106743
-
Mutual verifiable provable data auditing in public cloud storage
-
Y. Ren, J. Shen, J. Wang, J. Han, S. Lee Mutual verifiable provable data auditing in public cloud storage J. Internet Technol. 16 2 2015 317 323
-
(2015)
J. Internet Technol.
, vol.16
, Issue.2
, pp. 317-323
-
-
Ren, Y.1
Shen, J.2
Wang, J.3
Han, J.4
Lee, S.5
-
18
-
-
84945431187
-
Dynamic remote data auditing for securing big data storage in cloud computing
-
Corrected Proof, Available online 10 September 2105
-
M. Sookhak, A. Gania, M.K. Khanb, R. Buyyac Dynamic remote data auditing for securing big data storage in cloud computing Inf. Sci. 2015 10.1016/j.ins.2015.09.004 Corrected Proof, Available online 10 September 2105
-
(2015)
Inf. Sci.
-
-
Sookhak, M.1
Gania, A.2
Khanb, M.K.3
Buyyac, R.4
-
19
-
-
84901607854
-
A review on remote data auditing in single cloud server: Taxonomy and open issues
-
M. Sookhak, H. Talebian, E. Ahmed A review on remote data auditing in single cloud server: taxonomy and open issues J. Netw. Comput. Appl. 43 2014 121 141
-
(2014)
J. Netw. Comput. Appl.
, vol.43
, pp. 121-141
-
-
Sookhak, M.1
Talebian, H.2
Ahmed, E.3
-
20
-
-
84883057189
-
Public auditing for shared data with efficient user revocation in the cloud
-
B. Wang, B. Li, H. Li Public auditing for shared data with efficient user revocation in the cloud IEEE Infocom 8 1 2013 2904 2912
-
(2013)
IEEE Infocom
, vol.8
, Issue.1
, pp. 2904-2912
-
-
Wang, B.1
Li, B.2
Li, H.3
-
21
-
-
84922271700
-
Oruta: Privacy-preserving public auditing for shared data in the cloud
-
B. Wang, B. Li, H. Li Oruta: privacy-preserving public auditing for shared data in the cloud IEEE Trans. Cloud Comput. 2 1 2014 43 56
-
(2014)
IEEE Trans. Cloud Comput.
, vol.2
, Issue.1
, pp. 43-56
-
-
Wang, B.1
Li, B.2
Li, H.3
-
22
-
-
84893341393
-
Storing shared data in cloud vid security-mediator
-
B. Wang, S.S.M. Chow, M. Li, H. Li Storing shared data in cloud vid security-mediator Proceedings of the 33rd International Conference on Distributed Computing Systems 7973, IEEE 2013 2013 124 133
-
(2013)
Proceedings of the 33rd International Conference on Distributed Computing Systems 7973, IEEE 2013
, pp. 124-133
-
-
Wang, B.1
Chow, S.S.M.2
Li, M.3
Li, H.4
-
23
-
-
84861959172
-
Privacy-preserving public auditing for secure cloud storage
-
C. Wang, S. Chow, Q. Wang, K. Ren, W. Lou Privacy-preserving public auditing for secure cloud storage IEEE Trans. Comput. 62 2 2013 362 375
-
(2013)
IEEE Trans. Comput.
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
24
-
-
84890471117
-
Proxy provable data possession in public clouds
-
H. Wang Proxy provable data possession in public clouds IEEE Trans. Serv. Comput. 6 4 2013 551 558
-
(2013)
IEEE Trans. Serv. Comput.
, vol.6
, Issue.4
, pp. 551-558
-
-
Wang, H.1
-
25
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, K. Ren, W. Lou, J. Li Enabling public auditability and data dynamics for storage security in cloud computing IEEE Trans. Parallel and Distrib. Syst. 22 5 2011 847 859
-
(2011)
IEEE Trans. Parallel and Distrib. Syst.
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
26
-
-
84961733854
-
-
accessed 06.10.2015
-
Wikipedia, 2014 celebrity photo hack, https://en.wikipedia.org/wiki/2014-celebrity-photo-hack (accessed 06.10.2015).
-
2014 Celebrity Photo Hack
-
-
-
27
-
-
84858284080
-
Data storage auditing service in cloud computing: Challenges, methods and opportunities
-
K. Yang, X. Jia Data storage auditing service in cloud computing: challenges, methods and opportunities World Wide Web-Internet and Web Inf. Syst. 15 4 2012 409 428
-
(2012)
World Wide Web-Internet and Web Inf. Syst.
, vol.15
, Issue.4
, pp. 409-428
-
-
Yang, K.1
Jia, X.2
-
28
-
-
84911416889
-
A hybrid solution for privacy preserving medical data sharing in the cloud environment
-
J. Yang, J. Li, Y. Niu A hybrid solution for privacy preserving medical data sharing in the cloud environment Future Gener. Comput. Syst. 43-44 2015 74 86
-
(2015)
Future Gener. Comput. Syst.
, vol.43-44
, pp. 74-86
-
-
Yang, J.1
Li, J.2
Niu, Y.3
-
29
-
-
84928139575
-
Enabling cloud storage auditing with key-exposure resistance
-
J. Yu, K. Ren, C. Wang, V. Varadharajan Enabling cloud storage auditing with key-exposure resistance IEEE Trans. Inf. Forensics and Secur. 10 6 2015 1167 1179
-
(2015)
IEEE Trans. Inf. Forensics and Secur.
, vol.10
, Issue.6
, pp. 1167-1179
-
-
Yu, J.1
Ren, K.2
Wang, C.3
Varadharajan, V.4
-
30
-
-
84949654521
-
IRIBE: Intrusion-resilient identity-based encryption
-
J. Yu, R. Hao, H.W. Zhao, M.L. Shu, J.X. Fan IRIBE: Intrusion-resilient identity-based encryption Inf. Sci. 329 2016 90 104
-
(2016)
Inf. Sci.
, vol.329
, pp. 90-104
-
-
Yu, J.1
Hao, R.2
Zhao, H.W.3
Shu, M.L.4
Fan, J.X.5
-
31
-
-
84901836903
-
One forward-secure signature scheme using bilinear maps and its applications
-
J. Yu, F.Y. Kong, X.G. Cheng, R. Hao, G.W. Li One forward-secure signature scheme using bilinear maps and its applications Inf. Sci. 279 2014 60 76
-
(2014)
Inf. Sci.
, vol.279
, pp. 60-76
-
-
Yu, J.1
Kong, F.Y.2
Cheng, X.G.3
Hao, R.4
Li, G.W.5
-
32
-
-
84888362150
-
On the security of auditing mechanisms for secure cloud storage
-
Y. Yu, L. Niu, G. Yang, Y. Mu, W. Susilo On the security of auditing mechanisms for secure cloud storage Future Gener. Comput. Syst. 30 2014 127 132
-
(2014)
Future Gener. Comput. Syst.
, vol.30
, pp. 127-132
-
-
Yu, Y.1
Niu, L.2
Yang, G.3
Mu, Y.4
Susilo, W.5
-
33
-
-
84938057153
-
Remote data possession checking with enhanced security for cloud storage
-
Y. Yu, Y. Zhang, J. Ni, M. Au, L. Chen, H. Liu Remote data possession checking with enhanced security for cloud storage Future Gener. Comput. Syst. 52 2015 77 85
-
(2015)
Future Gener. Comput. Syst.
, vol.52
, pp. 77-85
-
-
Yu, Y.1
Zhang, Y.2
Ni, J.3
Au, M.4
Chen, L.5
Liu, H.6
-
34
-
-
84961773105
-
On the security of a public auditing mechanism for shared cloud data service
-
Y. Yu, J. Ni, M. Au, Y. Mu, B. Wang, H. Li On the security of a public auditing mechanism for shared cloud data service IEEE Trans. Serv. Comput. 2015 10.1109/TSC.2014.2355201
-
(2015)
IEEE Trans. Serv. Comput.
-
-
Yu, Y.1
Ni, J.2
Au, M.3
Mu, Y.4
Wang, B.5
Li, H.6
-
35
-
-
84934283890
-
Public integrity auditing for dynamic data sharing with multiuser modification
-
J. Yuan, S. Yu Public integrity auditing for dynamic data sharing with multiuser modification IEEE Trans. Inf. Forensics and Secur. 10 8 2015 1717 1726
-
(2015)
IEEE Trans. Inf. Forensics and Secur.
, vol.10
, Issue.8
, pp. 1717-1726
-
-
Yuan, J.1
Yu, S.2
|