메뉴 건너뛰기




Volumn 11, Issue 6, 2016, Pages 1362-1375

Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates

Author keywords

Cloud storage; cloud storage auditing; key update; outsourcing computing; verifiability

Indexed keywords

ACCESS CONTROL; DESIGN; NETWORK SECURITY; OUTSOURCING;

EID: 84963837768     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2016.2528500     Document Type: Article
Times cited : (150)

References (36)
  • 3
    • 79960862322 scopus 로고    scopus 로고
    • Secure and practical outsourcing oflinear programming in cloud computing
    • Apr.
    • C. Wang, K. Ren, J. Wang, "Secure and practical outsourcing oflinear programming in cloud computing," in Proc. IEEE INFOCOM,Apr. 2011, pp. 820-828.
    • (2011) Proc IEEE INFOCOM , pp. 820-828
    • Wang, C.1    Ren, K.2    Wang, J.3
  • 7
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • Berlin, Germany: Springer-Verlag
    • H. Shacham and B. Waters, "Compact proofs of retrievability," inAdvances in Cryptology. Berlin, Germany: Springer-Verlag, 2008,pp. 90-107.
    • (2008) Advances in Cryptology , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 12
    • 77954843911 scopus 로고    scopus 로고
    • Toward publicly auditable securecloud data storage services
    • Jul./Aug.
    • C. Wang, K. Ren, W. Lou, J. Li, "Toward publicly auditable securecloud data storage services," IEEE Netw., vol. 24, no. 4, pp. 19-24,Jul./Aug. 2010.
    • (2010) IEEE Netw. , vol.24 , Issue.4 , pp. 19-24
    • Wang, C.1    Ren, K.2    Lou, W.3    Li, J.4
  • 13
    • 79953294892 scopus 로고    scopus 로고
    • Enabling publicauditability and data dynamics for storage security in cloud computing
    • May
    • Q. Wang, C. Wang, K. Ren, W. Lou, J. Li, "Enabling publicauditability and data dynamics for storage security in cloud computing,"IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5, pp. 847-859,May 2011.
    • (2011) IEEE Trans. Parallel Distrib. Syst. , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Ren, K.3    Lou, W.4    Li, J.5
  • 14
    • 84858284080 scopus 로고    scopus 로고
    • Data storage auditing service in cloud computing:Challenges, methods and opportunities
    • K. Yang and X. Jia, "Data storage auditing service in cloud computing:Challenges, methods and opportunities," World Wide Web, vol. 15, no. 4,pp. 409-428, 2012.
    • (2012) World Wide Web , vol.15 , Issue.4 , pp. 409-428
    • Yang, K.1    Jia, X.2
  • 15
    • 84878830854 scopus 로고    scopus 로고
    • Dynamicaudit services for outsourced storages in clouds
    • Apr./Jun.
    • Y. Zhu, G.-J. Ahn, H. Hu, S. S. Yau, H. G. An, C.-J. Hu, "Dynamicaudit services for outsourced storages in clouds," IEEE Trans. ServicesComput., vol. 6, no. 2, pp. 227-238, Apr./Jun. 2013.
    • (2013) IEEE Trans. ServicesComput. , vol.6 , Issue.2 , pp. 227-238
    • Zhu, Y.1    Ahn, G.-J.2    Hu, H.3    Yau, S.S.4    An, H.G.5    Hu, C.-J.6
  • 16
    • 84881080693 scopus 로고    scopus 로고
    • An efficient and secure dynamic auditing protocolfor data storage in cloud computing
    • Sep.
    • K. Yang and X. Jia, "An efficient and secure dynamic auditing protocolfor data storage in cloud computing," IEEE Trans. Parallel Distrib. Syst.,vol. 24, no. 9, pp. 1717-1726, Sep. 2013.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.9 , pp. 1717-1726
    • Yang, K.1    Jia, X.2
  • 17
    • 84890471117 scopus 로고    scopus 로고
    • Proxy provable data possession in public clouds
    • Oct./Dec.
    • H. Wang, "Proxy provable data possession in public clouds," IEEETrans. Services Comput., vol. 6, no. 4, pp. 551-559, Oct./Dec. 2013.
    • (2013) IEEE Trans. Services Comput. , vol.6 , Issue.4 , pp. 551-559
    • Wang, H.1
  • 18
    • 84861959172 scopus 로고    scopus 로고
    • Privacypreservingpublic auditing for secure cloud storage
    • Feb.
    • C. Wang, S. S. M. Chow, Q. Wang, K. Ren, W. Lou, "Privacypreservingpublic auditing for secure cloud storage," IEEE Trans.Comput., vol. 62, no. 2, pp. 362-375, Feb. 2013.
    • (2013) IEEE Trans.Comput. , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.S.M.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 19
    • 84922271700 scopus 로고    scopus 로고
    • Oruta: Privacy-preserving publicauditing for shared data in the cloud
    • Jan./Mar.
    • B. Wang, B. Li, H. Li Oruta, "Oruta: Privacy-preserving publicauditing for shared data in the cloud," IEEE Trans. Cloud Comput.,vol. 2, no. 1, pp. 43-56, Jan./Mar. 2014.
    • (2014) IEEE Trans. Cloud Comput. , vol.2 , Issue.1 , pp. 43-56
    • Wang, B.1    Li, B.2    Li Oruta, H.3
  • 21
    • 84883057189 scopus 로고    scopus 로고
    • Public auditing for shared data with efficientuser revocation in the cloud
    • Apr.
    • B. Wang, B. Li, H. Li, "Public auditing for shared data with efficientuser revocation in the cloud," in Proc. IEEE INFOCOM, Apr. 2013,pp. 2904-2912.
    • (2013) Proc IEEE INFOCOM , pp. 2904-2912
    • Wang, B.1    Li, B.2    Li, H.3
  • 22
    • 84934283890 scopus 로고    scopus 로고
    • Public integrity auditing for dynamic data sharingwith multiuser modification
    • Aug.
    • J. Yuan and S. Yu, "Public integrity auditing for dynamic data sharingwith multiuser modification," IEEE Trans. Inf. Forensics Security,vol. 10, no. 8, pp. 1717-1726, Aug. 2015.
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.8 , pp. 1717-1726
    • Yuan, J.1    Yu, S.2
  • 23
    • 84928139575 scopus 로고    scopus 로고
    • Enabling cloud storageauditing with key-exposure resistance
    • Jun.
    • J. Yu, K. Ren, C. Wang, V. Varadharajan, "Enabling cloud storageauditing with key-exposure resistance," IEEE Trans. Inf. ForensicsSecurity, vol. 10, no. 6, pp. 1167-1179, Jun. 2015.
    • (2015) IEEE Trans. Inf. ForensicsSecurity , vol.10 , Issue.6 , pp. 1167-1179
    • Yu, J.1    Ren, K.2    Wang, C.3    Varadharajan, V.4
  • 24
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • Berlin, Germany: Springer-Verlag
    • D. Chaum and T. Pedersen, "Wallet databases with observers," inAdvances in Cryptology. Berlin, Germany: Springer-Verlag, 1993,pp. 89-105.
    • (1993) Advances in Cryptology , pp. 89-105
    • Chaum, D.1    Pedersen, T.2
  • 26
    • 24144493423 scopus 로고    scopus 로고
    • How to securely outsourcecryptographic computations
    • S. Hohenberger and A. Lysyanskaya, "How to securely outsourcecryptographic computations," in Proc. TCC, 2005, pp. 264-282.
    • (2005) Proc. TCC , pp. 264-282
    • Hohenberger, S.1    Lysyanskaya, A.2
  • 27
    • 27644520949 scopus 로고    scopus 로고
    • Secure outsourcing of sequencecomparisons
    • M. J. Atallah and J. Li, "Secure outsourcing of sequencecomparisons," Int. J. Inf. Secur., vol. 4, no. 4, pp. 277-287, 2005.
    • (2005) Int. J. Inf. Secur. , vol.4 , Issue.4 , pp. 277-287
    • Atallah, M.J.1    Li, J.2
  • 30
    • 84906655458 scopus 로고    scopus 로고
    • Efficient computation outsourcingfor inverting a class of homomorphic functions
    • Dec.
    • F. Zhang, X. Ma, S. Liu, "Efficient computation outsourcingfor inverting a class of homomorphic functions," Inf. Sci., vol. 286,pp. 19-28, Dec. 2014.
    • (2014) Inf. Sci. , vol.286 , pp. 19-28
    • Zhang, F.1    Ma, X.2    Liu, S.3
  • 31
    • 84945431187 scopus 로고    scopus 로고
    • Dynamic remotedata auditing for securing big data storage in cloud computing
    • Sep.
    • M. Sookhak, A. Gania, M. K. Khanb, R. Buyyac, "Dynamic remotedata auditing for securing big data storage in cloud computing," Inf. Sci.,Sep. 2105, doi: 10.1016/j.ins.2015.09.004.
    • Inf. Sci. , vol.2105
    • Sookhak, M.1    Gania, A.2    Khanb, M.K.3    Buyyac, R.4
  • 33
    • 84962382590 scopus 로고    scopus 로고
    • Enablingpublic auditing for shared data in cloud storage supporting identityprivacy and traceability
    • Mar.
    • G. Yang, J. Yu, W. Shen, Q. Su, Z. Fu, R. Hao, "Enablingpublic auditing for shared data in cloud storage supporting identityprivacy and traceability," J. Syst. Softw., vol. 113, pp. 130-139,Mar. 2016.
    • (2016) J. Syst. Softw. , vol.113 , pp. 130-139
    • Yang, G.1    Yu, J.2    Shen, W.3    Su, Q.4    Fu, Z.5    Hao, R.6
  • 34
    • 84901836903 scopus 로고    scopus 로고
    • One forward-securesignature scheme using bilinear maps and its applications
    • Sep.
    • J. Yu, F. Kong, X. Cheng, R. Hao, G. Li, "One forward-securesignature scheme using bilinear maps and its applications," Inf. Sci.,vol. 279, pp. 60-76, Sep. 2014.
    • (2014) Inf. Sci. , vol.279 , pp. 60-76
    • Yu, J.1    Kong, F.2    Cheng, X.3    Hao, R.4    Li, G.5
  • 35
    • 84949654521 scopus 로고    scopus 로고
    • IRIBE: Intrusionresilientidentity-based encryption
    • Feb.
    • J. Yu, R. Hao, H. Zhao, M. Shu, J. Fan, "IRIBE: Intrusionresilientidentity-based encryption," Inf. Sci., vol. 329, pp. 90-104,Feb. 2016.
    • (2016) Inf. Sci. , vol.329 , pp. 90-104
    • Yu, J.1    Hao, R.2    Zhao, H.3    Shu, M.4    Fan, J.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.