메뉴 건너뛰기




Volumn 10, Issue 6, 2016, Pages 661-668

Reliable and confidential cloud storage with efficient data forwarding functionality

Author keywords

[No Author keywords available]

Indexed keywords

BLENDING; CRYPTOGRAPHY; REED-SOLOMON CODES;

EID: 84964285769     PISSN: 17518628     EISSN: None     Source Type: Journal    
DOI: 10.1049/iet-com.2015.0608     Document Type: Article
Times cited : (9)

References (21)
  • 1
    • 77950347409 scopus 로고    scopus 로고
    • 'A view of cloud computing'
    • Armbrust, M., Fox, A., Griffith, R., et al.: 'A view of cloud computing', Commun. ACM, 2010, 53, (4), pp. 50-58
    • (2010) Commun. ACM , vol.53 , Issue.4 , pp. 50-58
    • Armbrust, M.1    Fox, A.2    Griffith, R.3
  • 3
    • 33745218758 scopus 로고    scopus 로고
    • 'Improved proxy re-encryption schemes with applications to secure distributed storage'
    • Ateniese, G., Fu, K., Green, M., et al.: 'Improved proxy re-encryption schemes with applications to secure distributed storage', ACM Trans. Inf. Syst. Secur., 2006, 9, (1), pp. 1-30
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3
  • 4
    • 84883057189 scopus 로고    scopus 로고
    • 'Public auditing for shared data with efficient user revocation in the cloud'
    • April 2013
    • Wang, B., Li, B., Li, H.: 'Public auditing for shared data with efficient user revocation in the cloud'. 2013 Proc. of IEEE INFOCOM, April 2013, pp. 2904-2912
    • (2013) Proc. of IEEE INFOCOM , pp. 2904-2912
    • Wang, B.1    Li, B.2    Li, H.3
  • 5
    • 84860512062 scopus 로고    scopus 로고
    • 'A secure erasure code-based cloud storage system with secure data forwarding'
    • Lin, H.Y., Tzeng, W.G.: 'A secure erasure code-based cloud storage system with secure data forwarding', IEEE Trans. Parallel Distrib. Syst., 2012, 23, (6), pp. 995-1003
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.6 , pp. 995-1003
    • Lin, H.Y.1    Tzeng, W.G.2
  • 6
    • 77953310709 scopus 로고    scopus 로고
    • 'Achieving secure, scalable, and fine-grained data access control in cloud computing'
    • March 2010
    • Yu, S.,Wang, C., Ren, K., et al.: 'Achieving secure, scalable, and fine-grained data access control in cloud computing'. 2010 Proc. of IEEE INFOCOM, March 2010, pp. 1-9
    • (2010) Proc. of IEEE INFOCOM , pp. 1-9
    • Yu, S.1    Wang, C.2    Ren, K.3
  • 7
    • 77954471010 scopus 로고    scopus 로고
    • Attribute based data sharing with attribute revocation'
    • Fifth ACM Symp. on Information, Computer and Communications Security
    • Yu, S., Wang, C., Ren, K., et al.: 'Attribute based data sharing with attribute revocation'. Proc. Fifth ACM Symp. on Information, Computer and Communications Security, 2010, pp. 261-270
    • (2010) Proc , pp. 261-270
    • Yu, S.1    Wang, C.2    Ren, K.3
  • 8
    • 79957599737 scopus 로고    scopus 로고
    • 'Ciphertext policy attribute based encryption with efficient revocation'
    • (University of Waterloo
    • Liang, X., Lu, R., Lin, X., et al.: 'Ciphertext policy attribute based encryption with efficient revocation' (University of Waterloo, 2010)
    • (2010)
    • Liang, X.1    Lu, R.2    Lin, X.3
  • 9
    • 84886903289 scopus 로고    scopus 로고
    • 'DAC-MACS: effective data access control for multiauthority cloud storage systems'
    • Yang, K., Jia, X.H., Ren, K., et al.: 'DAC-MACS: effective data access control for multiauthority cloud storage systems', IEEE Trans. Inf. Forensics Secur., 2013, 8, (11), pp. 1790-1801
    • (2013) IEEE Trans. Inf. Forensics Secur. , vol.8 , Issue.11 , pp. 1790-1801
    • Yang, K.1    Jia, X.H.2    Ren, K.3
  • 10
    • 84877786210 scopus 로고    scopus 로고
    • 'Mona: secure multi-owner data sharing for dynamic groups in the cloud'
    • Liu, X., Zhang, Y., Wang, B., et al.: 'Mona: secure multi-owner data sharing for dynamic groups in the cloud', IEEE Trans. Parallel Distrib. Syst., 2013, 24, (6), pp. 1182-1191
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.6 , pp. 1182-1191
    • Liu, X.1    Zhang, Y.2    Wang, B.3
  • 11
    • 84878313623 scopus 로고    scopus 로고
    • 'Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage'
    • Cheng, Y., Wang, Z.Y., Ma, J., et al.: 'Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage', J. Zhejiang Univ. Sci. C, 2013, 14, (2), pp. 85-97
    • (2013) J. Zhejiang Univ. Sci. C , vol.14 , Issue.2 , pp. 85-97
    • Cheng, Y.1    Wang, Z.Y.2    Ma, J.3
  • 12
    • 84921381171 scopus 로고    scopus 로고
    • 'Identity-based encryption with outsourced revocation in cloud computing'
    • Li, J., Li, J., Chen, X., et al.: 'Identity-based encryption with outsourced revocation in cloud computing', IEEE Trans. Comput., 2015, 64, (2), pp. 425-437
    • (2015) IEEE Trans. Comput. , vol.64 , Issue.2 , pp. 425-437
    • Li, J.1    Li, J.2    Chen, X.3
  • 13
    • 77954472312 scopus 로고    scopus 로고
    • Secure provenance: the essential of bread and butter of data forensics in cloud computing'
    • Fifth ACM Symp. on Information, Computer and Communications Security
    • Lu, R., Lin, X., Liang, X., et al.: 'Secure provenance: the essential of bread and butter of data forensics in cloud computing'. Proc. Fifth ACM Symp. on Information, Computer and Communications Security, 2010, pp. 282-292
    • (2010) Proc , pp. 282-292
    • Lu, R.1    Lin, X.2    Liang, X.3
  • 14
    • 85032883059 scopus 로고
    • 'A public key cryptosystem and a signature scheme based on discrete logarithms'
    • ElGamal, T.: 'A public key cryptosystem and a signature scheme based on discrete logarithms', Adv. Cryptol., 1985, pp. 10-18
    • (1985) Adv. Cryptol. , pp. 10-18
    • ElGamal, T.1
  • 15
    • 0024641589 scopus 로고
    • 'Efficient dispersal of information for security
    • Rabin, M.O.: 'Efficient dispersal of information for security, load balancing, and fault tolerance', J. ACM, 1989, 36, (2), pp. 335-348
    • (1989) load balancing, and fault tolerance', J. ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.O.1
  • 16
    • 85077023955 scopus 로고    scopus 로고
    • AONT-RS: blending security and performance in dispersed storage systems'
    • on File and Storage Technologies
    • Resch, J.K., Plank, J.S.: 'AONT-RS: blending security and performance in dispersed storage systems'. USENIX Conf. on File and Storage Technologies, 2011, pp. 191-202
    • (2011) USENIX Conf , pp. 191-202
    • Resch, J.K.1    Plank, J.S.2
  • 17
    • 0018545449 scopus 로고
    • 'How to share a secret'
    • Shamir, A.: 'How to share a secret', Commun. ACM, 1979, 22, (11), pp. 612-613
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 18
    • 84893791666 scopus 로고    scopus 로고
    • 'A secure and efficient scheme for cloud storage against eavesdropper'
    • Qing, S., Zhou, J., Liu, D., (Eds) (Springer International Publishing
    • Liu, J., Wang, H., Xian, M., et al.: 'A secure and efficient scheme for cloud storage against eavesdropper', in Qing, S., Zhou, J., Liu, D., (Eds): 'Information and communications security, ser. lecture notes in computer science' (Springer International Publishing, 2013), vol. 8233, pp. 75-89
    • (2013) 'Information and communications security, ser. lecture notes in computer science' , vol.8233 , pp. 75-89
    • Liu, J.1    Wang, H.2    Xian, M.3
  • 19
    • 3142523603 scopus 로고    scopus 로고
    • 'The UCON ABC usage control model'
    • Park, J., Sandhu, R.: 'The UCON ABC usage control model', ACM Trans. Inf. Syst. Secur., 2004, 7, (1), pp. 128-174
    • (2004) ACM Trans. Inf. Syst. Secur. , vol.7 , Issue.1 , pp. 128-174
    • Park, J.1    Sandhu, R.2
  • 20
    • 84891802796 scopus 로고    scopus 로고
    • 'Enabling data integrity protection in regenerating-coding-based cloud storage: theory and implementation'
    • Chen, H., Lee, P.: 'Enabling data integrity protection in regenerating-coding-based cloud storage: theory and implementation', IEEE Trans. on Parallel Distrib. Syst., 2014, 25, (2), pp. 407-416
    • (2014) IEEE Trans. on Parallel Distrib. Syst. , vol.25 , Issue.2 , pp. 407-416
    • Chen, H.1    Lee, P.2
  • 21
    • 84964194513 scopus 로고    scopus 로고
    • 'Why is elgamal key generation so slow?'
    • accessed June
    • 'Why is elgamal key generation so slow?'. Available at http://www.cryptopp.com/ fom-serve/cache/71.html, accessed June 2015
    • (2015)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.