메뉴 건너뛰기




Volumn 31, Issue 3, 2016, Pages 464-472

Survey on secure cloud storage

Author keywords

Cloud storage; Data deduplication; Data encryption; Integrity audit; Oblivious storage

Indexed keywords


EID: 84975761150     PISSN: 10049037     EISSN: None     Source Type: Journal    
DOI: 10.16337/j.1004-9037.2016.03.005     Document Type: Article
Times cited : (18)

References (56)
  • 3
    • 84975760404 scopus 로고    scopus 로고
    • AWS outage knocks Amazon, Netflix, Tinder and IMDb in MEGA data collapse
    • 2015-09-20
    • Fiveash K. AWS outage knocks Amazon, Netflix, Tinder and IMDb in MEGA data collapse[EB/OL]. http://www.theregister.co.uk/2015/09/20/aws_database_outage/, 2015-09-20.
    • Fiveash, K.1
  • 4
    • 84975779490 scopus 로고    scopus 로고
    • Google suffered a rare but major outage early Thursday
    • 2015-03-12
    • O'Reilly L. Google suffered a rare but major outage early Thursday[EB/OL]. http://www.businessinsider.com/google-is-down-2015-3, 2015-03-12.
    • O'Reilly, L.1
  • 5
    • 84975779510 scopus 로고    scopus 로고
    • Google SSL certificate update error affects millions of Gmail users
    • 2015-04-07
    • Neal D. Google SSL certificate update error affects millions of Gmail users[EB/OL]. http://www.v3.co.uk/v3-uk/news/2402863/google-ssl-certificate-update-error-affects-millions-of-gmail-users, 2015-04-07.
    • Neal, D.1
  • 6
    • 84907737354 scopus 로고    scopus 로고
    • Secure and privacy-preserving data storage service in public cloud
    • Li Hui, Sun Wenhai, Li Fenghua, et al. Secure and privacy-preserving data storage service in public cloud[J]. Journal of Computer Research and Development, 2014, 51(7): 1397-1409.
    • (2014) Journal of Computer Research and Development , vol.51 , Issue.7 , pp. 1397-1409
    • Li, H.1    Sun, W.2    Li, F.3
  • 7
    • 84930172379 scopus 로고    scopus 로고
    • A secure storage system over cloud storage environment
    • Xue Mao, Xue Wei, Shu Jiwu, et al. A secure storage system over cloud storage environment[J]. Chinese Journal of Computers, 2015, 38(5): 987-998.
    • (2015) Chinese Journal of Computers , vol.38 , Issue.5 , pp. 987-998
    • Xue, M.1    Xue, W.2    Shu, J.3
  • 8
    • 84941657639 scopus 로고    scopus 로고
    • Provident resource defragmentation algorithm for cloud data center network
    • Guo Lei, Hou Weigang. Provident resource defragmentation algorithm for cloud data center network[J]. Journal of Data Acquisition and Processing, 2015, 30(3): 519-527.
    • (2015) Journal of Data Acquisition and Processing , vol.30 , Issue.3 , pp. 519-527
    • Guo, L.1    Hou, W.2
  • 16
    • 79960005023 scopus 로고    scopus 로고
    • Privacy-preserving access of outsourced data via oblivious RAM simulation
    • Berlin, Heidelberg: Springer
    • Goodrich M T, Mitzenmacher M. Privacy-preserving access of outsourced data via oblivious RAM simulation[M]//Automata, Languages and Programming. Berlin, Heidelberg: Springer, 2011: 576-587.
    • (2011) Automata, Languages and Programming , pp. 576-587
    • Goodrich, M.T.1    Mitzenmacher, M.2
  • 21
    • 84881250193 scopus 로고    scopus 로고
    • Oblivistore: High performance oblivious cloud storage
    • Berkeley: IEEE
    • Stefanov E, Shi E. Oblivistore: High performance oblivious cloud storage[C]//IEEE Symposium on Security and Privacy (SP). Berkeley: IEEE, 2013: 253-267.
    • (2013) IEEE Symposium on Security and Privacy (SP) , pp. 253-267
    • Stefanov, E.1    Shi, E.2
  • 24
    • 84905923774 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • Cao N, Wang C, Li M, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1): 222-233.
    • (2014) IEEE Transactions on Parallel and Distributed Systems , vol.25 , Issue.1 , pp. 222-233
    • Cao, N.1    Wang, C.2    Li, M.3
  • 30
    • 78650053109 scopus 로고    scopus 로고
    • Side channels in cloud services: Deduplication in cloud storage
    • Harnik D, Pinkas B, Shulman-Peleg A. Side channels in cloud services: Deduplication in cloud storage[J]. IEEE Security and Privacy, 2010, 8(6): 40-47.
    • (2010) IEEE Security and Privacy , vol.8 , Issue.6 , pp. 40-47
    • Harnik, D.1    Pinkas, B.2    Shulman-Peleg, A.3
  • 33
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • Goldreich O, Ostrovsky R. Software protection and simulation on oblivious RAMs[J]. Journal of the ACM (JACM), 1996, 43(3): 431-473.
    • (1996) Journal of the ACM (JACM) , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 36
    • 80955149556 scopus 로고    scopus 로고
    • Remote oblivious storage: Making oblivious RAM practical
    • 2011-03-30/2016-02-18
    • Boneh D, Mazieres D, Popa R A. Remote oblivious storage: Making oblivious RAM practical[EB/OL]. http://dspace.mit.edu/bitstream/handle/1721.1/62006/MIT-CSAIL-TR-2011-018.pdf, 2011-03-30/2016-02-18.
    • Boneh, D.1    Mazieres, D.2    Popa, R.A.3
  • 39
    • 82955198777 scopus 로고    scopus 로고
    • Towards practical oblivious RAM
    • 2012-12-18
    • Stefanov E, Shi E, Song D. Towards practical oblivious RAM[EB/OL]. Http://arxiv.org/abs/1106.3652, 2012-12-18.
    • Stefanov, E.1    Shi, E.2    Song, D.3
  • 40
    • 84937774864 scopus 로고    scopus 로고
    • Burst ORAM: Minimizing ORAM response times for bursty access patterns
    • San Diego
    • Dautrich J, Stefanov E, Shi E. Burst ORAM: Minimizing ORAM response times for bursty access patterns[C]//23rd USENIX Security Symposium. San Diego: [s. n.], 2014: 749-764.
    • (2014) 23rd USENIX Security Symposium , pp. 749-764
    • Dautrich, J.1    Stefanov, E.2    Shi, E.3
  • 42
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • New York: Springer-Verlag
    • Shamir A. Identity-based cryptosystems and signature schemes[C]//Proceedings of CRYPTO 84 on Advances in Cryptology. New York: Springer-Verlag, 1985: 47-53.
    • (1985) Proceedings of CRYPTO 84 on Advances in Cryptology , pp. 47-53
    • Shamir, A.1
  • 45
    • 84886903289 scopus 로고    scopus 로고
    • Dac-macs: Effective data access control for multiauthority cloud storage systems
    • Yang K, Jia X, Ren K, et al. Dac-macs: Effective data access control for multiauthority cloud storage systems[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(11): 1790-1801.
    • (2013) IEEE Transactions on Information Forensics and Security , vol.8 , Issue.11 , pp. 1790-1801
    • Yang, K.1    Jia, X.2    Ren, K.3
  • 46
  • 47
    • 84883284958 scopus 로고    scopus 로고
    • The OAuth 2.0 authorization framework
    • 2016-02-18
    • Hardt D. The OAuth 2.0 authorization framework[EB/OL]. Https://www.rfc-editor.org/rfc/rfc6749.txt, 2016-02-18.
    • Hardt, D.1
  • 48
    • 84881537144 scopus 로고    scopus 로고
    • Toward privacy-assured and searchable cloud data storage services
    • Li M, Yu S, Ren K, et al. Toward privacy-assured and searchable cloud data storage services[J]. IEEE Network, 2013, 27(4): 56-62.
    • (2013) IEEE Network , vol.27 , Issue.4 , pp. 56-62
    • Li, M.1    Yu, S.2    Ren, K.3
  • 49
    • 84919829652 scopus 로고    scopus 로고
    • Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption
    • Jung T, Li X Y, Wan Z, et al. Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(1): 190-199.
    • (2015) IEEE Transactions on Information Forensics and Security , vol.10 , Issue.1 , pp. 190-199
    • Jung, T.1    Li, X.Y.2    Wan, Z.3
  • 53
    • 84869466694 scopus 로고    scopus 로고
    • Cooperative provable data possession for integrity verification in multicloud storage
    • Zhu Y, Hu H, Ahn G J, et al. Cooperative provable data possession for integrity verification in multicloud storage[J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(12): 2231-2244.
    • (2012) IEEE Transactions on Parallel and Distributed Systems , vol.23 , Issue.12 , pp. 2231-2244
    • Zhu, Y.1    Hu, H.2    Ahn, G.J.3
  • 54
    • 84878830854 scopus 로고    scopus 로고
    • Dynamic audit services for outsourced storages in clouds
    • Zhu Y, Ahn G J, Hu H, et al. Dynamic audit services for outsourced storages in clouds[J]. IEEE Transactions on Services Computing, 2013, 6(2): 227-238.
    • (2013) IEEE Transactions on Services Computing , vol.6 , Issue.2 , pp. 227-238
    • Zhu, Y.1    Ahn, G.J.2    Hu, H.3
  • 55
    • 84889087663 scopus 로고    scopus 로고
    • Security and privacy for storage and computation in cloud computing
    • Wei L, Zhu H, Cao Z, et al. Security and privacy for storage and computation in cloud computing[J]. Information Sciences, 2014, 258: 371-386.
    • (2014) Information Sciences , vol.258 , pp. 371-386
    • Wei, L.1    Zhu, H.2    Cao, Z.3
  • 56
    • 79958074367 scopus 로고    scopus 로고
    • A forward-secure digital signature scheme
    • Heidelberg: Springer Berlin
    • Bellare M, Miner S K. A forward-secure digital signature scheme[C]//Advances in Cryptology-Crypto'99. Heidelberg: Springer Berlin, 1999: 431-448.
    • (1999) Advances in Cryptology-Crypto'99 , pp. 431-448
    • Bellare, M.1    Miner, S.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.