메뉴 건너뛰기




Volumn 65, Issue 8, 2016, Pages 2363-2373

Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation

Author keywords

cloud computing; dynamic data; group signature; Public integrity auditing; victor commitment

Indexed keywords

CLOUD COMPUTING; NETWORK SECURITY;

EID: 84978654857     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2015.2389955     Document Type: Article
Times cited : (147)

References (47)
  • 2
    • 84978770670 scopus 로고    scopus 로고
    • [Online]
    • Google. (2005). Google drive. Google [Online]. Available: http://drive.google.com/
    • (2005) Google Drive. Google
  • 8
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security
    • Apr.
    • M. Rabin, "Efficient dispersal of information for security," J. ACM, vol. 36, no. 2, pp. 335-348, Apr. 1989.
    • (1989) J. ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.1
  • 16
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • Mar.
    • C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing," in Proc. IEEE 29th Conf. Inform. Commun., Mar. 2010, pp. 525-533.
    • (2010) Proc. IEEE 29th Conf. Inform. Commun. , pp. 525-533
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 17
    • 84878475706 scopus 로고    scopus 로고
    • Proofs of retrievability with public verifiability and constant communication cost in cloud
    • May
    • J. Yuan and S. Yu, "Proofs of retrievability with public verifiability and constant communication cost in cloud," in Proc. Int. Workshop Secur. Cloud Comput., May 2013, pp. 19-26.
    • (2013) Proc. Int. Workshop Secur. Cloud Comput. , pp. 19-26
    • Yuan, J.1    Yu, S.2
  • 20
    • 84978714042 scopus 로고    scopus 로고
    • Online code editor. Codeanywhere [Online]
    • Codeanywhere. (2011). Online code editor. Codeanywhere [Online]. Available: https://codeanywhere.net/
    • (2011) Codeanywhere
  • 21
    • 84978730008 scopus 로고    scopus 로고
    • Online code editor. Cloud IDE [Online]
    • eXo Cloud IDE. (2002). Online code editor. Cloud IDE [Online]. Available: https://codenvy.com/
    • (2002)
    • eXo Cloud IDE1
  • 22
    • 84866761388 scopus 로고    scopus 로고
    • Oruta: Privacy-preserving public auditing for shared data in the cloud
    • Jun.
    • B. Wang, B. Li, and H. Li, "Oruta: Privacy-preserving public auditing for shared data in the cloud," in Proc. IEEE 5th Int. Conf. Cloud Comput., Jun. 2012, pp. 295-302.
    • (2012) Proc. IEEE 5th Int. Conf. Cloud Comput. , pp. 295-302
    • Wang, B.1    Li, B.2    Li, H.3
  • 23
    • 84883057189 scopus 로고    scopus 로고
    • Public auditing for shared data with efficient user revocation in the cloud
    • Apr.
    • B. Wang, L. Baochun, and L. Hui, "Public auditing for shared data with efficient user revocation in the cloud," in Proc. IEEE INFOCOM, Apr. 2013, pp. 2904-2912.
    • (2013) Proc. IEEE INFOCOM , pp. 2904-2912
    • Wang, B.1    Baochun, L.2    Hui, L.3
  • 24
    • 84904430603 scopus 로고    scopus 로고
    • Efficient public integrity checking for cloud data sharing with multi-user modification
    • Apr.
    • J. Yuan and S. Yu, "Efficient public integrity checking for cloud data sharing with multi-user modification," in Proc. IEEE INFOCOM, Apr. 2014, pp. 2121-2129.
    • (2014) Proc. IEEE INFOCOM , pp. 2121-2129
    • Yuan, J.1    Yu, S.2
  • 25
    • 84873948499 scopus 로고    scopus 로고
    • Vector commitments and their applications
    • Mar.
    • D. Catalano and D. Fiore, "Vector commitments and their applications," in Proc. Public-Key Cryptography, Mar. 2013, pp. 55-72.
    • (2013) Proc. Public-Key Cryptography , pp. 55-72
    • Catalano, D.1    Fiore, D.2
  • 29
    • 35048848152 scopus 로고    scopus 로고
    • Collision-free accumulators and fail-stop signature schemes without trees
    • May
    • D. Boneh and X. Boyen, "Collision-free accumulators and fail-stop signature schemes without trees," in Proc. EUROCRYPT, May 2004, pp. 56-73.
    • (2004) Proc. EUROCRYPT , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 32
    • 84955567079 scopus 로고    scopus 로고
    • Diffie-Hellman oracles
    • Aug.
    • U. M. Maurer and S. Wolf, "Diffie-Hellman oracles," in Proc. CRYPTO, Aug. 1996, pp. 268-282.
    • (1996) Proc. CRYPTO , pp. 268-282
    • Maurer, U.M.1    Wolf, S.2
  • 34
    • 84906510644 scopus 로고    scopus 로고
    • Verifiable computation over large database with incremental updates
    • Sep.
    • X. Chen, J. Li, J. Weng, J. Ma, and W. Lou, "Verifiable computation over large database with incremental updates," in Proc. Eur. Symp. Res. Comput. Secur., Sep. 2014, pp. 148-162.
    • (2014) Proc. Eur. Symp. Res. Comput. Secur. , pp. 148-162
    • Chen, X.1    Li, J.2    Weng, J.3    Ma, J.4    Lou, W.5
  • 37
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • Sep.
    • R. Gennaro, C. Gentry, and B. Parno, "Non-interactive verifiable computing: Outsourcing computation to untrusted workers," in Proc. 30th Annu. Conf. Adv. Cryptol., Sep. 2010, pp. 465-482.
    • (2010) Proc. 30th Annu. Conf. Adv. Cryptol. , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 38
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • May
    • C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proc. 41st Annu. ACM Symp. Theory Comput., May 2009, pp. 169-178.
    • (2009) Proc. 41st Annu. ACM Symp. Theory Comput. , pp. 169-178
    • Gentry, C.1
  • 43
    • 84937429196 scopus 로고    scopus 로고
    • Efficient revocation in group signatures
    • Feb.
    • E. Bresson and J. Stern, "Efficient revocation in group signatures," in Proc. Public-Key Cryptography, Feb. 2001, pp. 190-206.
    • (2001) Proc. Public-Key Cryptography , pp. 190-206
    • Bresson, E.1    Stern, J.2
  • 44
    • 84937428748 scopus 로고    scopus 로고
    • Dynamic accumulators and application to efficient revocation of anonymous credentials
    • Aug.
    • J. Camenisch and A. Lysyanskaya, "Dynamic accumulators and application to efficient revocation of anonymous credentials," in Proc. 22nd Annu. Int. Cryptol. Conf. Adv. Cryptol., Aug. 2002, pp. 61-76.
    • (2002) Proc. 22nd Annu. Int. Cryptol. Conf. Adv. Cryptol. , pp. 61-76
    • Camenisch, J.1    Lysyanskaya, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.