메뉴 건너뛰기




Volumn 11, Issue 11, 2016, Pages 2572-2583

Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud

Author keywords

Cloud storage; online offline signature; privacy preserving; public auditing

Indexed keywords

DIGITAL STORAGE;

EID: 84986575553     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2016.2587242     Document Type: Article
Times cited : (104)

References (38)
  • 3
    • 84951873931 scopus 로고    scopus 로고
    • Leakage-resilient identification schemes from zero-knowledge proofs of storage
    • G. Ateniese, A. Faonio, and S. Kamara, "Leakage-resilient identification schemes from zero-knowledge proofs of storage," in Proc. IMA Int. Conf. Cryptogr. Coding, 2015, pp. 311-328.
    • (2015) Proc. IMA Int. Conf. Cryptogr. Coding , pp. 311-328
    • Ateniese, G.1    Faonio, A.2    Kamara, S.3
  • 6
    • 84885645897 scopus 로고    scopus 로고
    • Using algebraic signatures to check data possession in cloud storage
    • L. Chen, "Using algebraic signatures to check data possession in cloud storage," Future Generat. Comput. Syst., vol. 29, no. 7, pp. 1709-1715, 2013.
    • (2013) Future Generat. Comput. Syst. , vol.29 , Issue.7 , pp. 1709-1715
    • Chen, L.1
  • 9
    • 84905221667 scopus 로고    scopus 로고
    • On indistinguishability in remote data integrity checking
    • X. Fan, G. Yang, Y. Mu, and Y. Yu, "On indistinguishability in remote data integrity checking," Comput. J., vol. 58, no. 4, pp. 823-830, 2015.
    • (2015) Comput. J. , vol.58 , Issue.4 , pp. 823-830
    • Fan, X.1    Yang, G.2    Mu, Y.3    Yu, Y.4
  • 11
    • 84982135416 scopus 로고    scopus 로고
    • Enabling personalized search over encrypted outsourced data with efficiency improvement
    • to be published
    • Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, "Enabling personalized search over encrypted outsourced data with efficiency improvement," IEEE Trans. Parallel Distrib. Syst., to be published, doi: 10.1109/TPDS.2015.2506573.
    • IEEE Trans. Parallel Distrib. Syst.
    • Fu, Z.1    Ren, K.2    Shu, J.3    Sun, X.4    Huang, F.5
  • 12
    • 84922280033 scopus 로고    scopus 로고
    • Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing
    • Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, "Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing," IEICE Trans. Commun., vol. E98-B, no. 1, pp. 190-200, 2015.
    • (2015) IEICE Trans. Commun. , vol.E98-B , Issue.1 , pp. 190-200
    • Fu, Z.1    Sun, X.2    Liu, Q.3    Zhou, L.4    Shu, J.5
  • 13
    • 79960900327 scopus 로고    scopus 로고
    • A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
    • Mar.
    • Z. Hao, S. Zhong, and N. Yu, "A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability," IEEE Trans. Knowl. Data Eng., vol. 23, no. 9, pp. 1432-1437, Mar. 2011.
    • (2011) IEEE Trans. Knowl. Data Eng. , vol.23 , Issue.9 , pp. 1432-1437
    • Hao, Z.1    Zhong, S.2    Yu, N.3
  • 15
    • 84928105578 scopus 로고    scopus 로고
    • Insecurity of an efficient privacy-preserving public auditing scheme for cloud data storage
    • H. Liu, L. Chen, Z. Davar, and M. Pour, "Insecurity of an efficient privacy-preserving public auditing scheme for cloud data storage," J. Universal Comput. Sci., vol. 21, no. 3, pp. 473-482, 2015.
    • (2015) J. Universal Comput. Sci. , vol.21 , Issue.3 , pp. 473-482
    • Liu, H.1    Chen, L.2    Davar, Z.3    Pour, M.4
  • 16
    • 85050702776 scopus 로고    scopus 로고
    • Fine-grained twofactor access control for Web-based cloud computing services
    • Mar.
    • J. K. Liu, M. H. Au, X. Huang, R. Lu, and J. Li, "Fine-grained twofactor access control for Web-based cloud computing services," IEEE Trans. Inf. Forensics Security, vol. 11, no. 3, pp. 484-497, Mar. 2016.
    • (2016) IEEE Trans. Inf. Forensics Security , vol.11 , Issue.3 , pp. 484-497
    • Liu, J.K.1    Au, M.H.2    Huang, X.3    Lu, R.4    Li, J.5
  • 17
    • 77955088735 scopus 로고    scopus 로고
    • Efficient online/offline identity-based signature for wireless sensor network
    • J. K. Liu, J. Baek, J. Zhou, Y. Yang, and J. W. Wong, "Efficient online/offline identity-based signature for wireless sensor network," Int. J. Inf. Secur., vol. 9, no. 4, pp. 287-296, 2010.
    • (2010) Int. J. Inf. Secur. , vol.9 , Issue.4 , pp. 287-296
    • Liu, J.K.1    Baek, J.2    Zhou, J.3    Yang, Y.4    Wong, J.W.5
  • 18
    • 84969869837 scopus 로고    scopus 로고
    • Two-factor data security protection mechanism for cloud storage system
    • Jun.
    • J. K. Liu, K. Liang, W. Susilo, J. Liu, and Y. Xiang, "Two-factor data security protection mechanism for cloud storage system," IEEE Trans. Comput., vol. 65, no. 6, pp. 1992-2004, Jun. 2016.
    • (2016) IEEE Trans. Comput. , vol.65 , Issue.6 , pp. 1992-2004
    • Liu, J.K.1    Liang, K.2    Susilo, W.3    Liu, J.4    Xiang, Y.5
  • 21
    • 84928106743 scopus 로고    scopus 로고
    • Mutual verifiable provable data auditing in public cloud storage
    • Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, "Mutual verifiable provable data auditing in public cloud storage," J. Internet Technol., vol. 16, no. 2, pp. 317-323, 2015.
    • (2015) J. Internet Technol. , vol.16 , Issue.2 , pp. 317-323
    • Ren, Y.1    Shen, J.2    Wang, J.3    Han, J.4    Lee, S.5
  • 25
    • 84861959172 scopus 로고    scopus 로고
    • Privacypreserving public auditing for secure cloud storage
    • Feb.
    • C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, "Privacypreserving public auditing for secure cloud storage," IEEE Trans. Comput., vol. 62, no. 2, pp. 362-375, Feb. 2013.
    • (2013) IEEE Trans. Comput. , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.S.M.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 27
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • Mar.
    • C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing," in Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM), Mar. 2010, pp. 1-9.
    • (2010) Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM) , pp. 1-9
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 28
    • 79953294892 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing
    • May
    • Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public verifiability and data dynamics for storage security in cloud computing," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5, pp. 847-859, May 2011.
    • (2011) IEEE Trans. Parallel Distrib. Syst. , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 29
    • 84902317194 scopus 로고    scopus 로고
    • Secure and efficient privacypreserving public auditing scheme for cloud storage
    • S. Worku, C. Xu, J. Zhao, and X. He, "Secure and efficient privacypreserving public auditing scheme for cloud storage," Comput. Elect. Eng., vol. 40, no. 5, pp. 1703-1713, 2014.
    • (2014) Comput. Elect. Eng. , vol.40 , Issue.5 , pp. 1703-1713
    • Worku, S.1    Xu, C.2    Zhao, J.3    He, X.4
  • 31
    • 84962448916 scopus 로고    scopus 로고
    • A secure and dynamic multikeyword ranked search scheme over encrypted cloud data
    • Feb.
    • Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and dynamic multikeyword ranked search scheme over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340-352, Feb. 2016.
    • (2016) IEEE Trans. Parallel Distrib. Syst. , vol.27 , Issue.2 , pp. 340-352
    • Xia, Z.1    Wang, X.2    Sun, X.3    Wang, Q.4
  • 33
    • 84934283890 scopus 로고    scopus 로고
    • Public integrity auditing for dynamic data sharing with multiuser modification
    • Aug.
    • J. Yuan and S. Yu, "Public integrity auditing for dynamic data sharing with multiuser modification," IEEE Trans. Inf. Forensics Security, vol. 10, no. 8, pp. 1717-1726, Aug. 2015.
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.8 , pp. 1717-1726
    • Yuan, J.1    Yu, S.2
  • 34
    • 84922625583 scopus 로고    scopus 로고
    • Certificateless one-pass and two-party authenticated key agreement protocol and its extensions
    • Feb.
    • L. Zhang, "Certificateless one-pass and two-party authenticated key agreement protocol and its extensions," Inf. Sci., vol. 293, pp. 182-195, Feb. 2015.
    • (2015) Inf. Sci. , vol.293 , pp. 182-195
    • Zhang, L.1
  • 35
    • 84978708856 scopus 로고    scopus 로고
    • Privacypreserving vehicular communication authentication with hierarchical aggregation and fast response
    • Aug.
    • L. Zhang, C. Hu, Q. Wu, J. Domingo-Ferrer, and B. Qin, "Privacypreserving vehicular communication authentication with hierarchical aggregation and fast response," IEEE Trans. Comput., vol. 65, no. 8, pp. 2562-2574, Aug. 2016, doi: 10.1109/TC.2015.2485225.
    • (2016) IEEE Trans. Comput. , vol.65 , Issue.8 , pp. 2562-2574
    • Zhang, L.1    Hu, C.2    Wu, Q.3    Domingo-Ferrer, J.4    Qin, B.5
  • 36
    • 84960339093 scopus 로고    scopus 로고
    • Roundefficient and sender-unrestricted dynamic group key agreement protocol for secure group communications
    • Nov.
    • L. Zhang, Q. Wu, J. Domingo-Ferrer, B. Qin, and Z. Dong, "Roundefficient and sender-unrestricted dynamic group key agreement protocol for secure group communications," IEEE Trans. Inf. Forensics Security, vol. 10, no. 11, pp. 2352-2364, Nov. 2015.
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.11 , pp. 2352-2364
    • Zhang, L.1    Wu, Q.2    Domingo-Ferrer, J.3    Qin, B.4    Dong, Z.5
  • 38
    • 77952252546 scopus 로고    scopus 로고
    • A scalable robust authentication protocol for secure vehicular communications
    • May
    • L. Zhang, Q. Wu, A. Solanas, and J. Domingo-Ferrer, "A scalable robust authentication protocol for secure vehicular communications," IEEE Trans. Veh. Technol., vol. 59, no. 4, pp. 1606-1617, May 2010.
    • (2010) IEEE Trans. Veh. Technol. , vol.59 , Issue.4 , pp. 1606-1617
    • Zhang, L.1    Wu, Q.2    Solanas, A.3    Domingo-Ferrer, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.