메뉴 건너뛰기




Volumn 65, Issue , 2017, Pages 29-49

A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends

Author keywords

Cloud computing security; Communication complexity; Data integrity; Privacy preserving audit; Storage as a service

Indexed keywords

CLOUD COMPUTING; COMPUTATIONAL EFFICIENCY; COST EFFECTIVENESS; COSTS; DATA PRIVACY; EFFICIENCY; NETWORK SECURITY; OUTSOURCING; STORAGE AS A SERVICE (STAAS); TAXONOMIES;

EID: 84995919538     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2016.10.006     Document Type: Article
Times cited : (105)

References (103)
  • 1
    • 84861498357 scopus 로고    scopus 로고
    • Investigation of IT security and compliance challenges in security-as-a-service for cloud computing
    • in “Object/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW), 2012 15th IEEE International Symposium on”, pp. 124–29
    • Al-Aqrabi, H., Liu, L., Xu, J., Hill, R., Antonopoulos, N., Zhan, Y., Investigation of IT security and compliance challenges in security-as-a-service for cloud computing. in “Object/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW), 2012 15th IEEE International Symposium on”, pp. 124–29, 2012.
    • (2012)
    • Al-Aqrabi, H.1    Liu, L.2    Xu, J.3    Hill, R.4    Antonopoulos, N.5    Zhan, Y.6
  • 2
    • 84897104467 scopus 로고    scopus 로고
    • Enhanced GeoProof: improved geographic assurance for data in the cloud
    • Albeshri, A., Boyd, C., Nieto, J., Enhanced GeoProof: improved geographic assurance for data in the cloud. Int J Inf Secur 13:2 (2014), 191–198.
    • (2014) Int J Inf Secur , vol.13 , Issue.2 , pp. 191-198
    • Albeshri, A.1    Boyd, C.2    Nieto, J.3
  • 3
    • 79952914992 scopus 로고    scopus 로고
    • Using multi shares for ensuring privacy in database-as-a-service
    • in “System Sciences (HICSS), 2011 44th Hawaii International Conference on”, pp. 1–9
    • ALzain, M., Pardede, E., Using multi shares for ensuring privacy in database-as-a-service. in “System Sciences (HICSS), 2011 44th Hawaii International Conference on”, pp. 1–9, 2011.
    • (2011)
    • ALzain, M.1    Pardede, E.2
  • 4
    • 84880553279 scopus 로고    scopus 로고
    • secure database-as-a-service with Cipherbase
    • in “Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data”, ACM, New York, NY, USA, pp. 1033–36
    • Arasu, A., Blanas, S., Eguro, K., Joglekar, M., Kaushik, R., Kossmann, D., et al. secure database-as-a-service with Cipherbase. in “Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data”, ACM, New York, NY, USA, pp. 1033–36, 2013.
    • (2013)
    • Arasu, A.1    Blanas, S.2    Eguro, K.3    Joglekar, M.4    Kaushik, R.5    Kossmann, D.6
  • 5
    • 68249129760 scopus 로고    scopus 로고
    • “Above the clouds: a Berkeley view of cloud computing”(UCB/EECS-2009-28)
    • Technical report, EECS Department, University of California, Berkeley
    • Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., et al. “Above the clouds: a Berkeley view of cloud computing”(UCB/EECS-2009-28). Technical report, EECS Department, University of California, Berkeley, 2009.
    • (2009)
    • Armbrust, M.1    Fox, A.2    Griffith, R.3    Joseph, A.D.4    Katz, R.H.5    Konwinski, A.6
  • 6
    • 74049102823 scopus 로고    scopus 로고
    • Provable data possession at untrusted stores
    • in “Proceedings of the 14th ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 598–609
    • Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., et al. Provable data possession at untrusted stores. in “Proceedings of the 14th ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 598–609, 2007.
    • (2007)
    • Ateniese, G.1    Burns, R.2    Curtmola, R.3    Herring, J.4    Kissner, L.5    Peterson, Z.6
  • 7
    • 70249129465 scopus 로고    scopus 로고
    • Scalable and efficient provable data possession
    • in “Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks”, ACM, New York, NY, USA, pp. 9:1–9:10
    • Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G., Scalable and efficient provable data possession. in “Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks”, ACM, New York, NY, USA, pp. 9:1–9:10, 2008.
    • (2008)
    • Ateniese, G.1    Di Pietro, R.2    Mancini, L.V.3    Tsudik, G.4
  • 8
    • 72449185582 scopus 로고    scopus 로고
    • Proofs of storage from homomorphic identification protocols
    • in “Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology”, Springer-Verlag, Berlin, Heidelberg, pp. 319–33
    • Ateniese, G., Kamara, S., Katz, J., Proofs of storage from homomorphic identification protocols. in “Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology”, Springer-Verlag, Berlin, Heidelberg, pp. 319–33, 2009.
    • (2009)
    • Ateniese, G.1    Kamara, S.2    Katz, J.3
  • 10
    • 84863686692 scopus 로고    scopus 로고
    • Integrity verification of multiple data copies over untrusted cloud servers
    • in “Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (Ccgrid 2012)”, IEEE Computer Society, Washington, DC, USA, pp. 829–34
    • Barsoum, A.F., Hasan, M.A., Integrity verification of multiple data copies over untrusted cloud servers. in “Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (Ccgrid 2012)”, IEEE Computer Society, Washington, DC, USA, pp. 829–34, 2012.
    • (2012)
    • Barsoum, A.F.1    Hasan, M.A.2
  • 11
    • 85052022812 scopus 로고    scopus 로고
    • DupLESS: server-aided encryption for deduplicated storage
    • in “Proceedings of the 22Nd USENIX Conference on Security”, USENIX Association, Berkeley, CA, USA, pp. 179–94
    • Bellare, M., Keelveedhi, S., Ristenpart, T., DupLESS: server-aided encryption for deduplicated storage. in “Proceedings of the 22Nd USENIX Conference on Security”, USENIX Association, Berkeley, CA, USA, pp. 179–94, 2013.
    • (2013)
    • Bellare, M.1    Keelveedhi, S.2    Ristenpart, T.3
  • 12
    • 84883391608 scopus 로고    scopus 로고
    • Message-locked encryption and secure deduplication
    • T. Johansson P. Nguyen Springer Berlin Heidelberg
    • Bellare, M., Keelveedhi, S., Ristenpart, T., Message-locked encryption and secure deduplication. Johansson, T., Nguyen, P., (eds.) Advances in cryptology – EUROCRYPT 2013, 2013, Springer Berlin Heidelberg, 296–312.
    • (2013) Advances in cryptology – EUROCRYPT 2013 , pp. 296-312
    • Bellare, M.1    Keelveedhi, S.2    Ristenpart, T.3
  • 13
    • 84858712240 scopus 로고    scopus 로고
    • Technical challenges of forensic investigations in cloud computing environments
    • Workshop on Cryptography and Security in Clouds
    • Birk, D., Technical challenges of forensic investigations in cloud computing environments. Workshop on Cryptography and Security in Clouds, 2011.
    • (2011)
    • Birk, D.1
  • 14
    • 74049144464 scopus 로고    scopus 로고
    • HAIL: a high-availability and integrity layer for cloud storage
    • in “Proceedings of the 16th ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 187–98
    • Bowers, K.D., Juels, A., Oprea, A., HAIL: a high-availability and integrity layer for cloud storage. in “Proceedings of the 16th ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 187–98, 2009.
    • (2009)
    • Bowers, K.D.1    Juels, A.2    Oprea, A.3
  • 15
    • 74049136395 scopus 로고    scopus 로고
    • Proofs of retrievability: theory and implementation
    • in “Proceedings of the 2009 ACM Workshop on Cloud Computing Security”, ACM, New York, NY, USA, pp. 43–54
    • Bowers, K.D., Juels, A., Oprea, A., Proofs of retrievability: theory and implementation. in “Proceedings of the 2009 ACM Workshop on Cloud Computing Security”, ACM, New York, NY, USA, pp. 43–54, 2009.
    • (2009)
    • Bowers, K.D.1    Juels, A.2    Oprea, A.3
  • 16
    • 84888994853 scopus 로고    scopus 로고
    • Policy-based secure deletion
    • in “Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 259–70
    • Cachin, C., Haralambiev, K., Hsiao, H.-C., Sorniotti, A., Policy-based secure deletion. in “Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 259–70, 2013.
    • (2013)
    • Cachin, C.1    Haralambiev, K.2    Hsiao, H.-C.3    Sorniotti, A.4
  • 17
    • 82655182931 scopus 로고    scopus 로고
    • Windows Azure Storage: a highly available cloud storage service with strong consistency
    • in “Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles”, ACM, New York, NY, USA, pp. 143–57
    • Calder, B., Wang, J., Ogus, A., Nilakantan, N., Skjolsvold, A., McKelvie, S., et al. Windows Azure Storage: a highly available cloud storage service with strong consistency. in “Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles”, ACM, New York, NY, USA, pp. 143–57, 2011.
    • (2011)
    • Calder, B.1    Wang, J.2    Ogus, A.3    Nilakantan, N.4    Skjolsvold, A.5    McKelvie, S.6
  • 18
    • 84883411598 scopus 로고    scopus 로고
    • Dynamic proofs of retrievability via oblivious RAM
    • T. Johansson P.Q. Nguyen Springer Berlin Heidelberg
    • Cash, D., Küpçü, A., Wichs, D., Dynamic proofs of retrievability via oblivious RAM. Johansson, T., Nguyen, P.Q., (eds.) Advances in cryptology – EUROCRYPT 2013, 2013, Springer Berlin Heidelberg, 279–295.
    • (2013) Advances in cryptology – EUROCRYPT 2013 , pp. 279-295
    • Cash, D.1    Küpçü, A.2    Wichs, D.3
  • 19
    • 84903716872 scopus 로고    scopus 로고
    • A data assured deletion scheme in cloud storage
    • Chaoling, L., Yue, C., Yanzhou, Z., A data assured deletion scheme in cloud storage. IEEE Trans China Commun 11:4 (2014), 98–110.
    • (2014) IEEE Trans China Commun , vol.11 , Issue.4 , pp. 98-110
    • Chaoling, L.1    Yue, C.2    Yanzhou, Z.3
  • 20
    • 84866347734 scopus 로고    scopus 로고
    • Robust dynamic provable data possession
    • in “Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on”, pp. 515–25
    • Chen, B., Curtmola, R., Robust dynamic provable data possession. in “Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on”, pp. 515–25, 2012.
    • (2012)
    • Chen, B.1    Curtmola, R.2
  • 21
    • 84869445824 scopus 로고    scopus 로고
    • Robust dynamic remote data checking for public clouds
    • in “Proceedings of the 2012 ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 1043–45
    • Chen, B., Curtmola, R., Robust dynamic remote data checking for public clouds. in “Proceedings of the 2012 ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 1043–45, 2012.
    • (2012)
    • Chen, B.1    Curtmola, R.2
  • 22
    • 78650081896 scopus 로고    scopus 로고
    • Remote data checking for network coding-based distributed storage systems
    • in “Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop”, ACM, New York, NY, USA, pp. 31–42
    • Chen, B., Curtmola, R., Ateniese, G., Burns, R., Remote data checking for network coding-based distributed storage systems. in “Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop”, ACM, New York, NY, USA, pp. 31–42, 2010.
    • (2010)
    • Chen, B.1    Curtmola, R.2    Ateniese, G.3    Burns, R.4
  • 23
    • 84885645897 scopus 로고    scopus 로고
    • Using algebraic signatures to check data possession in cloud storage
    • Chen, L., Using algebraic signatures to check data possession in cloud storage. Future Gener Comput Syst 29:7 (2013), 1709–1715.
    • (2013) Future Gener Comput Syst , vol.29 , Issue.7 , pp. 1709-1715
    • Chen, L.1
  • 24
    • 84885662348 scopus 로고    scopus 로고
    • Data dynamics for remote data possession checking in cloud storage
    • Chen, L., Zhou, S., Huang, X., Xu, L., Data dynamics for remote data possession checking in cloud storage. Comput Electr Eng 39:7 (2013), 2413–2424.
    • (2013) Comput Electr Eng , vol.39 , Issue.7 , pp. 2413-2424
    • Chen, L.1    Zhou, S.2    Huang, X.3    Xu, L.4
  • 25
    • 84894098673 scopus 로고    scopus 로고
    • A hill cipher-based remote data possession checking in cloud storage
    • Chen, L., Guo, G., Peng, Z., A hill cipher-based remote data possession checking in cloud storage. Secur Commun Netw 7:3 (2014), 511–518.
    • (2014) Secur Commun Netw , vol.7 , Issue.3 , pp. 511-518
    • Chen, L.1    Guo, G.2    Peng, Z.3
  • 26
    • 74049093526 scopus 로고    scopus 로고
    • Controlling data in the cloud: outsourcing computation without outsourcing control
    • in “Proceedings of the 2009 ACM Workshop on Cloud Computing Security”, ACM, New York, NY, USA, pp. 85–90
    • Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., et al. Controlling data in the cloud: outsourcing computation without outsourcing control. in “Proceedings of the 2009 ACM Workshop on Cloud Computing Security”, ACM, New York, NY, USA, pp. 85–90, 2009.
    • (2009)
    • Chow, R.1    Golle, P.2    Jakobsson, M.3    Shi, E.4    Staddon, J.5    Masuoka, R.6
  • 27
    • 80053161148 scopus 로고    scopus 로고
    • Relational cloud: a database-as-a-service for the cloud
    • 5th Biennial Conference on Innovative Data Systems Research, CIDR 2011, January 9–12, 2011 Asilomar, California
    • Curino, C., Jones, E.P.C., Popa, R.A., Malviya, N., Wu, E., Madden, S., et al. Relational cloud: a database-as-a-service for the cloud. 5th Biennial Conference on Innovative Data Systems Research, CIDR 2011, January 9–12, 2011 Asilomar, California, 2011.
    • (2011)
    • Curino, C.1    Jones, E.P.C.2    Popa, R.A.3    Malviya, N.4    Wu, E.5    Madden, S.6
  • 28
    • 70349245590 scopus 로고    scopus 로고
    • Robust remote data checking
    • in “Proceedings of the 4th ACM International Workshop on Storage Security and Survivability”, ACM, New York, NY, USA, pp. 63–68
    • Curtmola, R., Khan, O., Burns, R., Robust remote data checking. in “Proceedings of the 4th ACM International Workshop on Storage Security and Survivability”, ACM, New York, NY, USA, pp. 63–68, 2008.
    • (2008)
    • Curtmola, R.1    Khan, O.2    Burns, R.3
  • 29
    • 51849117195 scopus 로고    scopus 로고
    • MR-PDP: multiple-replica provable data possession
    • in “ICDCS ‘08 Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems”, pp. 411–20
    • Curtmola, R., Khan, O., Burns, R., Ateniese, G., MR-PDP: multiple-replica provable data possession. in “ICDCS ‘08 Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems”, pp. 411–20, 2008.
    • (2008)
    • Curtmola, R.1    Khan, O.2    Burns, R.3    Ateniese, G.4
  • 30
    • 84902475228 scopus 로고    scopus 로고
    • Remote integrity checking
    • S. Jajodia L. Strous Springer US Gazzoni, E. L.; Luiz, D.; Filho, G.; Sérgio, P.; Barreto, L. M. & Politécnica, E. (2006), “Demonstrating Data Possession and Uncheatable Data Transfer”
    • Deswarte, Y., Quisquater, J.-J., Saïdane, A., Remote integrity checking. Jajodia, S., Strous, L., (eds.) Integrity and internal control in information systems VI, 2004, Springer US, 1–11 Gazzoni, E. L.; Luiz, D.; Filho, G.; Sérgio, P.; Barreto, L. M. & Politécnica, E. (2006), “Demonstrating Data Possession and Uncheatable Data Transfer”.
    • (2004) Integrity and internal control in information systems VI , pp. 1-11
    • Deswarte, Y.1    Quisquater, J.-J.2    Saïdane, A.3
  • 31
    • 70350681128 scopus 로고    scopus 로고
    • Proofs of retrievability via hardness amplification
    • O. Reingold Springer Berlin Heidelberg
    • Dodis, Y., Vadhan, S., Wichs, D., Proofs of retrievability via hardness amplification. Reingold, O., (eds.) Theory of cryptography, 2009, Springer Berlin Heidelberg, 109–127.
    • (2009) Theory of cryptography , pp. 109-127
    • Dodis, Y.1    Vadhan, S.2    Wichs, D.3
  • 32
    • 74049121230 scopus 로고    scopus 로고
    • Dynamic provable data possession
    • in “Proceedings of the 16th ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 213–22
    • Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R., Dynamic provable data possession. in “Proceedings of the 16th ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 213–22, 2009.
    • (2009)
    • Erway, C.1    Küpçü, A.2    Papamanthou, C.3    Tamassia, R.4
  • 33
    • 84929150479 scopus 로고    scopus 로고
    • FlexDPDP: FlexList-based optimized dynamic provable data possession
    • Cryptology ePrint Archive, Report 2013/645; Available from: Accessed 10 July
    • Esiner, E., Kachkeev, A., Braunfeld, S., Küpçü, A., Özkasap, Ö., FlexDPDP: FlexList-based optimized dynamic provable data possession. Cryptology ePrint Archive, Report 2013/645; Available from: https://eprint.iacr.org/2013/645, 2015 Accessed 10 July.
    • (2015)
    • Esiner, E.1    Kachkeev, A.2    Braunfeld, S.3    Küpçü, A.4    Özkasap, Ö.5
  • 34
    • 84879854325 scopus 로고    scopus 로고
    • Transparent, distributed, and replicated dynamic provable data possession
    • in “Proceedings of the 11th International Conference on Applied Cryptography and Network Security”, Springer-Verlag, Berlin, Heidelberg, pp. 1–18
    • Etemad, M., Küpçü, A., Transparent, distributed, and replicated dynamic provable data possession. in “Proceedings of the 11th International Conference on Applied Cryptography and Network Security”, Springer-Verlag, Berlin, Heidelberg, pp. 1–18, 2013.
    • (2013)
    • Etemad, M.1    Küpçü, A.2
  • 35
    • 84869829459 scopus 로고    scopus 로고
    • LogOS: an automatic logging framework for service-oriented architectures
    • in “Software Engineering and Advanced Applications (SEAA), 2012 38th EUROMICRO Conference on”, pp. 224–227
    • Frenot, S., Ponge, J., LogOS: an automatic logging framework for service-oriented architectures. in “Software Engineering and Advanced Applications (SEAA), 2012 38th EUROMICRO Conference on”, pp. 224–227, 2012.
    • (2012)
    • Frenot, S.1    Ponge, J.2
  • 36
    • 84943390581 scopus 로고    scopus 로고
    • Trusted validation for geolocation of cloud data
    • Fu, D.L., Peng, X.G., Yang, Y.L., Trusted validation for geolocation of cloud data. Comput J, 2014, 10.1093/comjnl/bxu144.
    • (2014) Comput J
    • Fu, D.L.1    Peng, X.G.2    Yang, Y.L.3
  • 37
    • 84874845364 scopus 로고    scopus 로고
    • Geolocation of data in the cloud
    • in “Proceedings of the Third ACM Conference on Data and Application Security and Privacy”, ACM, New York, NY, USA, pp. 25–36
    • Gondree, M., Peterson, Z.N., Geolocation of data in the cloud. in “Proceedings of the Third ACM Conference on Data and Application Security and Privacy”, ACM, New York, NY, USA, pp. 25–36, 2013.
    • (2013)
    • Gondree, M.1    Peterson, Z.N.2
  • 38
    • 84922430173 scopus 로고    scopus 로고
    • An efficient confidentiality-preserving proof of ownership for deduplication
    • González-Manzano, L., Orfila, A., An efficient confidentiality-preserving proof of ownership for deduplication. J Netw Comput Appl 50 (2015), 49–59.
    • (2015) J Netw Comput Appl , vol.50 , pp. 49-59
    • González-Manzano, L.1    Orfila, A.2
  • 39
    • 84891946061 scopus 로고    scopus 로고
    • Simplified File Assured Deletion (SFADE) – a user friendly overlay approach for data security in cloud storage system
    • in “Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on”, pp. 1640–44
    • Habib, A., Khanam, T., Palit, R., Simplified File Assured Deletion (SFADE) – a user friendly overlay approach for data security in cloud storage system. in “Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on”, pp. 1640–44, 2013.
    • (2013)
    • Habib, A.1    Khanam, T.2    Palit, R.3
  • 40
    • 84923872664 scopus 로고    scopus 로고
    • Provenance as a service: a data-centric approach for real-time monitoring
    • in “Big Data (BigData Congress), 2014 IEEE International Congress on”, pp. 258–65
    • Hammad, R., Wu, C.-S., Provenance as a service: a data-centric approach for real-time monitoring. in “Big Data (BigData Congress), 2014 IEEE International Congress on”, pp. 258–65, 2014.
    • (2014)
    • Hammad, R.1    Wu, C.-S.2
  • 41
    • 84901660429 scopus 로고    scopus 로고
    • Proofs of retrievability based on MRD codes
    • Huang X. Zhou J. Springer International Publishing
    • Han, S., Liu, S., Chen, K., Gu, D., Proofs of retrievability based on MRD codes. Huang, X., Zhou, J., (eds.) Information security practice and experience, 2014, Springer International Publishing, 330–345.
    • (2014) Information security practice and experience , pp. 330-345
    • Han, S.1    Liu, S.2    Chen, K.3    Gu, D.4
  • 42
    • 78650053109 scopus 로고    scopus 로고
    • Side channels in cloud services: deduplication in cloud storage
    • Harnik, D., Pinkas, B., Shulman-Peleg, A., Side channels in cloud services: deduplication in cloud storage. IEEE Secur Privacy 8:6 (2010), 40–47.
    • (2010) IEEE Secur Privacy , vol.8 , Issue.6 , pp. 40-47
    • Harnik, D.1    Pinkas, B.2    Shulman-Peleg, A.3
  • 43
    • 85125956358 scopus 로고    scopus 로고
    • Location data, purpose binding and contextual integrity: what's the message?
    • L. Floridi Springer International Publishing
    • Hildebrandt, M., Location data, purpose binding and contextual integrity: what's the message?. Floridi, L., (eds.) Protection of information and the right to privacy – a new equilibrium?, 2014, Springer International Publishing, 31–62.
    • (2014) Protection of information and the right to privacy – a new equilibrium? , pp. 31-62
    • Hildebrandt, M.1
  • 44
    • 84857977072 scopus 로고    scopus 로고
    • SECaaS: security as a service for cloud-based applications
    • in “Proceedings of the Second Kuwait Conference on e-Services and e-Systems”, ACM, New York, NY, USA, pp. 8:1–8:4
    • Hussain, M., Abdulsalam, H., SECaaS: security as a service for cloud-based applications. in “Proceedings of the Second Kuwait Conference on e-Services and e-Systems”, ACM, New York, NY, USA, pp. 8:1–8:4, 2011.
    • (2011)
    • Hussain, M.1    Abdulsalam, H.2
  • 45
    • 84901649741 scopus 로고    scopus 로고
    • TIMER: secure and reliable cloud storage against data re-outsourcing
    • Huang X. Zhou J. Springer International Publishing
    • Jiang, T., Chen, X., Li, J., Wong, D., Ma, J., Liu, J., TIMER: secure and reliable cloud storage against data re-outsourcing. Huang, X., Zhou, J., (eds.) Information security practice and experience, 2014, Springer International Publishing, 346–358.
    • (2014) Information security practice and experience , pp. 346-358
    • Jiang, T.1    Chen, X.2    Li, J.3    Wong, D.4    Ma, J.5    Liu, J.6
  • 46
    • 36448941716 scopus 로고    scopus 로고
    • Guide to integrating forensic techniques into incident response
    • NIST Special Publication 800–86
    • Kent, K., Chevalier, S., Grance, T., Dang, H., Guide to integrating forensic techniques into incident response. NIST Special Publication, 2006 800–86.
    • (2006)
    • Kent, K.1    Chevalier, S.2    Grance, T.3    Dang, H.4
  • 47
    • 84881303788 scopus 로고    scopus 로고
    • Computation certification as a service in the cloud
    • Cluster, Cloud and Grid Computing (CCGrid), 2013 13th IEEE/ACM International Symposium on. IEEE
    • Khan, S.M., Hamlen, K.W., Computation certification as a service in the cloud. Cluster, Cloud and Grid Computing (CCGrid), 2013 13th IEEE/ACM International Symposium on. IEEE, 2013.
    • (2013)
    • Khan, S.M.1    Hamlen, K.W.2
  • 48
    • 84871533728 scopus 로고    scopus 로고
    • Proof of possession for cloud storage via lagrangian interpolation techniques
    • in “Proceedings of the 6th International Conference on Network and System Security”, Springer-Verlag, Berlin, Heidelberg, pp. 305–19
    • Krzywiecki, Ł., Kuty, M., Proof of possession for cloud storage via lagrangian interpolation techniques. in “Proceedings of the 6th International Conference on Network and System Security”, Springer-Verlag, Berlin, Heidelberg, pp. 305–19, 2012.
    • (2012)
    • Krzywiecki, Ł.1    Kuty, M.2
  • 49
    • 84901776042 scopus 로고    scopus 로고
    • A secure and efficient audit mechanism for dynamic shared data in cloud storage
    • Article ID 820391
    • Kwon, O., Koo, D., Shin, Y., Yoon, H., A secure and efficient audit mechanism for dynamic shared data in cloud storage. Scientific World J, 2014, 2014, 10.1155/2014/820391 Article ID 820391.
    • (2014) Scientific World J , vol.2014
    • Kwon, O.1    Koo, D.2    Shin, Y.3    Yoon, H.4
  • 50
    • 84919999045 scopus 로고    scopus 로고
    • Novel approach: deduplication for backup systems using data block size
    • L.C. Jain H.S. Behera J.K. Mandal D.P. Mohapatra Springer India
    • Latesh Kumar, K., Lawrance, R., Novel approach: deduplication for backup systems using data block size. Jain, L.C., Behera, H.S., Mandal, J.K., Mohapatra, D.P., (eds.) Computational intelligence in data mining, vol. 1, 2015, Springer India, 365–373.
    • (2015) Computational intelligence in data mining , vol.1 , pp. 365-373
    • Latesh Kumar, K.1    Lawrance, R.2
  • 51
    • 84863061194 scopus 로고    scopus 로고
    • Hybrid provable data possession at untrusted stores in cloud computing
    • in “Proceedings of the 2011 IEEE 17th International Conference on Parallel and Distributed Systems”, IEEE Computer Society, Washington, DC, USA, pp. 638–45
    • Lee, N.-Y., Chang, Y.-K., Hybrid provable data possession at untrusted stores in cloud computing. in “Proceedings of the 2011 IEEE 17th International Conference on Parallel and Distributed Systems”, IEEE Computer Society, Washington, DC, USA, pp. 638–45, 2011.
    • (2011)
    • Lee, N.-Y.1    Chang, Y.-K.2
  • 52
    • 84911424659 scopus 로고    scopus 로고
    • MuR-DPA: Top-down levelled multi-replica Merkle Hash Tree based secure public auditing for dynamic big data storage on cloud
    • Computers, IEEE Transactions on PP(99), 1-1
    • Liu, C., Ranjan, R., Yang, C., Zhang, X., Wang, L., Chen, J., MuR-DPA: Top-down levelled multi-replica Merkle Hash Tree based secure public auditing for dynamic big data storage on cloud. Computers, IEEE Transactions on PP(99), 1-1, 2014.
    • (2014)
    • Liu, C.1    Ranjan, R.2    Yang, C.3    Zhang, X.4    Wang, L.5    Chen, J.6
  • 53
    • 80055101722 scopus 로고    scopus 로고
    • An improved dynamic provable data possession model
    • in “Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on”, pp. 290–95
    • Liu, F., Gu, D., Lu, H., An improved dynamic provable data possession model. in “Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on”, pp. 290–95, 2011.
    • (2011)
    • Liu, F.1    Gu, D.2    Lu, H.3
  • 54
    • 80055104916 scopus 로고    scopus 로고
    • Ensuring the data integrity in cloud data storage
    • in “Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on”, pp. 240–43
    • Luo, W., Bai, G., Ensuring the data integrity in cloud data storage. in “Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on”, pp. 240–43, 2011.
    • (2011)
    • Luo, W.1    Bai, G.2
  • 55
    • 84860711960 scopus 로고    scopus 로고
    • mHealth data security: the need for HIPAA-compliant standardization
    • Luxton, D.D., Kayl, R.A., Mishkind, M.C., mHealth data security: the need for HIPAA-compliant standardization. Telemed J E Health 18:4 (2012), 284–288, 10.1089/tmj.2011.0180.
    • (2012) Telemed J E Health , vol.18 , Issue.4 , pp. 284-288
    • Luxton, D.D.1    Kayl, R.A.2    Mishkind, M.C.3
  • 56
    • 84939982695 scopus 로고    scopus 로고
    • Payment-based incentive mechanism for secure cloud deduplication
    • Miao, M., Jiang, T., You, I., Payment-based incentive mechanism for secure cloud deduplication. Int J Inf Manag 35:3 (2015), 379–386.
    • (2015) Int J Inf Manag , vol.35 , Issue.3 , pp. 379-386
    • Miao, M.1    Jiang, T.2    You, I.3
  • 57
    • 84868108920 scopus 로고    scopus 로고
    • Provable data possession using Sigma-protocols
    • in “Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on”, pp. 565–72
    • Mohan, A., Katti, R., Provable data possession using Sigma-protocols. in “Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on”, pp. 565–72, 2012.
    • (2012)
    • Mohan, A.1    Katti, R.2
  • 58
    • 84868311717 scopus 로고    scopus 로고
    • Privacy preserving delegated access control in the storage as a service model
    • in “Information Reuse and Integration (IRI), 2012 IEEE 13th International Conference on”, pp. 645–52.
    • Nabeel, M., Bertino, E., Privacy preserving delegated access control in the storage as a service model. in “Information Reuse and Integration (IRI), 2012 IEEE 13th International Conference on”, pp. 645–52. 2012.
    • (2012)
    • Nabeel, M.1    Bertino, E.2
  • 59
    • 80053145892 scopus 로고    scopus 로고
    • DIaaS: data integrity as a service in the cloud
    • Cloud Computing (CLOUD), 2011 IEEE International Conference on. IEEE
    • Nepal, S., Chen, S., Yao, K.J., Thilakanathan, D., DIaaS: data integrity as a service in the cloud. Cloud Computing (CLOUD), 2011 IEEE International Conference on. IEEE, 2011.
    • (2011)
    • Nepal, S.1    Chen, S.2    Yao, K.J.3    Thilakanathan, D.4
  • 60
    • 84858611385 scopus 로고    scopus 로고
    • Verifying remote data integrity in peer-to-peer data storage: a comprehensive survey of protocols
    • Oualha, N., Leneutre, J., Roudier, Y., Verifying remote data integrity in peer-to-peer data storage: a comprehensive survey of protocols. Peer Peer Netw Appl 5:3 (2012), 231–243.
    • (2012) Peer Peer Netw Appl , vol.5 , Issue.3 , pp. 231-243
    • Oualha, N.1    Leneutre, J.2    Roudier, Y.3
  • 61
    • 84922983644 scopus 로고    scopus 로고
    • Trusted geolocation-aware data placement in infrastructure clouds
    • in “Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on”, pp. 352–60
    • Paladi, N., Aslam, M., Gehrmann, C., Trusted geolocation-aware data placement in infrastructure clouds. in “Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on”, pp. 352–60, 2014.
    • (2014)
    • Paladi, N.1    Aslam, M.2    Gehrmann, C.3
  • 62
    • 84880237695 scopus 로고    scopus 로고
    • A position paper on data sovereignty: the importance of geolocating data in the cloud
    • in “Proceedings of the 3rd USENIX Conference on Hot Topics in Cloud Computing”, USENIX Association, Berkeley, CA, USA, pp. 9–9
    • Peterson, Z.N.J., Gondree, M., Beverly, R., A position paper on data sovereignty: the importance of geolocating data in the cloud. in “Proceedings of the 3rd USENIX Conference on Hot Topics in Cloud Computing”, USENIX Association, Berkeley, CA, USA, pp. 9–9, 2011.
    • (2011)
    • Peterson, Z.N.J.1    Gondree, M.2    Beverly, R.3
  • 63
    • 80955144922 scopus 로고    scopus 로고
    • Enabling security in cloud storage SLAs with CloudProof
    • in “Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference”, USENIX Association, Berkeley, CA, USA, pp. 31–31
    • Popa, R.A., Lorch, J.R., Molnar, D., Wang, H.J., Zhuang, L., Enabling security in cloud storage SLAs with CloudProof. in “Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference”, USENIX Association, Berkeley, CA, USA, pp. 31–31, 2011.
    • (2011)
    • Popa, R.A.1    Lorch, J.R.2    Molnar, D.3    Wang, H.J.4    Zhuang, L.5
  • 64
    • 80155161434 scopus 로고    scopus 로고
    • A secure cloud backup system with assured deletion and version control
    • in “Parallel Processing Workshops (ICPPW), 2011 40th International Conference on”, pp. 160–67
    • Rahumed, A., Chen, H., Tang, Y., Lee, P., Lui, J., A secure cloud backup system with assured deletion and version control. in “Parallel Processing Workshops (ICPPW), 2011 40th International Conference on”, pp. 160–67, 2011.
    • (2011)
    • Rahumed, A.1    Chen, H.2    Tang, Y.3    Lee, P.4    Lui, J.5
  • 65
    • 84995958117 scopus 로고    scopus 로고
    • Proof of retrieval and ownership protocols for enterprise-level data deduplication
    • in “Proceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research”, IBM Corp., Riverton, NJ, USA, pp. 81–90
    • Rashid, F., Miri, A., Woungang, I., Proof of retrieval and ownership protocols for enterprise-level data deduplication. in “Proceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research”, IBM Corp., Riverton, NJ, USA, pp. 81–90, 2013.
    • (2013)
    • Rashid, F.1    Miri, A.2    Woungang, I.3
  • 66
    • 84881251312 scopus 로고    scopus 로고
    • SoK: secure data deletion
    • in “Security and Privacy (SP), 2013 IEEE Symposium on”, pp. 301–15
    • Reardon, J., Basin, D., Capkun, S., SoK: secure data deletion. in “Security and Privacy (SP), 2013 IEEE Symposium on”, pp. 301–15, 2013.
    • (2013)
    • Reardon, J.1    Basin, D.2    Capkun, S.3
  • 67
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
    • in “Proceedings of the 16th ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 199–212
    • Ristenpart, T., Tromer, E., Shacham, H., Savage, S., Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. in “Proceedings of the 16th ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 199–212, 2009.
    • (2009)
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 68
    • 84875940293 scopus 로고    scopus 로고
    • Proofs of Retrievability via Fountain Code
    • in “Proceedings of the 5th International Conference on Foundations and Practice of Security”, Springer-Verlag, Berlin, Heidelberg, pp. 18–32
    • Sarkar, S., Safavi-Naini, R., Proofs of Retrievability via Fountain Code. in “Proceedings of the 5th International Conference on Foundations and Practice of Security”, Springer-Verlag, Berlin, Heidelberg, pp. 18–32, 2013.
    • (2013)
    • Sarkar, S.1    Safavi-Naini, R.2
  • 69
    • 84871240221 scopus 로고    scopus 로고
    • Database as a service
    • Seibold, M., Kemper, A., Database as a service. Datenbank-Spektrum 12:1 (2012), 59–62.
    • (2012) Datenbank-Spektrum , vol.12 , Issue.1 , pp. 59-62
    • Seibold, M.1    Kemper, A.2
  • 70
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • J. Pieprzyk Springer Berlin Heidelberg
    • Shacham, H., Waters, B., Compact proofs of retrievability. Pieprzyk, J., (eds.) Advances in cryptology – ASIACRYPT 2008, 2008, Springer Berlin Heidelberg, 90–107.
    • (2008) Advances in cryptology – ASIACRYPT 2008 , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 71
    • 81055144591 scopus 로고    scopus 로고
    • Delegable provable data possession for remote data in the clouds
    • in “Proceedings of the 13th International Conference on Information and Communications Security”, Springer-Verlag, Berlin, Heidelberg, pp. 93–111
    • Shen, S.-T., Tzeng, W.-G., Delegable provable data possession for remote data in the clouds. in “Proceedings of the 13th International Conference on Information and Communications Security”, Springer-Verlag, Berlin, Heidelberg, pp. 93–111, 2011.
    • (2011)
    • Shen, S.-T.1    Tzeng, W.-G.2
  • 72
    • 84888986259 scopus 로고    scopus 로고
    • Practical dynamic proofs of retrievability
    • in “Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 325–36
    • Shi, E., Stefanov, E., Papamanthou, C., Practical dynamic proofs of retrievability. in “Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 325–36, 2013.
    • (2013)
    • Shi, E.1    Stefanov, E.2    Papamanthou, C.3
  • 73
    • 84901607854 scopus 로고    scopus 로고
    • A review on remote data auditing in single cloud server: taxonomy and open issues
    • Sookhak, M., Talebian, H., Ahmed, E., Gani, A., Khan, M.K., A review on remote data auditing in single cloud server: taxonomy and open issues. J Netw Comput Appl 43 (2014), 121–141.
    • (2014) J Netw Comput Appl , vol.43 , pp. 121-141
    • Sookhak, M.1    Talebian, H.2    Ahmed, E.3    Gani, A.4    Khan, M.K.5
  • 74
    • 84874822744 scopus 로고    scopus 로고
    • Adaptive data protection in distributed systems
    • in “Proceedings of the Third ACM Conference on Data and Application Security and Privacy”, ACM, New York, NY, USA, pp. 365–76
    • Squicciarini, A.C., Petracca, G., Bertino, E., Adaptive data protection in distributed systems. in “Proceedings of the Third ACM Conference on Data and Application Security and Privacy”, ACM, New York, NY, USA, pp. 365–76, 2013.
    • (2013)
    • Squicciarini, A.C.1    Petracca, G.2    Bertino, E.3
  • 75
    • 84872103252 scopus 로고    scopus 로고
    • Iris: a scalable cloud file system with efficient integrity checks
    • in “Proceedings of the 28th Annual Computer Security Applications Conference”, ACM, New York, NY, USA, pp. 229–38
    • Stefanov, E., van Dijk, M., Juels, A., Oprea, A., Iris: a scalable cloud file system with efficient integrity checks. in “Proceedings of the 28th Annual Computer Security Applications Conference”, ACM, New York, NY, USA, pp. 229–38, 2012.
    • (2012)
    • Stefanov, E.1    van Dijk, M.2    Juels, A.3    Oprea, A.4
  • 77
    • 84866619747 scopus 로고    scopus 로고
    • Secure overlay cloud storage with access control and assured deletion
    • Tang, Y., Lee, P., Lui, J., Perlman, R., Secure overlay cloud storage with access control and assured deletion. IEEE Trans Dependable Secure Comput 9:6 (2012), 903–916.
    • (2012) IEEE Trans Dependable Secure Comput , vol.9 , Issue.6 , pp. 903-916
    • Tang, Y.1    Lee, P.2    Lui, J.3    Perlman, R.4
  • 78
    • 84874832699 scopus 로고    scopus 로고
    • Multi-user dynamic proofs of data possession using trusted hardware
    • in “Proceedings of the Third ACM Conference on Data and Application Security and Privacy”, ACM, New York, NY, USA, pp. 353–64
    • Tate, S.R., Vishwanathan, R., Everhart, L., Multi-user dynamic proofs of data possession using trusted hardware. in “Proceedings of the Third ACM Conference on Data and Application Security and Privacy”, ACM, New York, NY, USA, pp. 353–64, 2013.
    • (2013)
    • Tate, S.R.1    Vishwanathan, R.2    Everhart, L.3
  • 79
    • 84863472230 scopus 로고    scopus 로고
    • Knox: privacy-preserving auditing for shared data with large groups in the cloud
    • in “Proceedings of the 10th International Conference on Applied Cryptography and Network Security”, Springer-Verlag, Berlin, Heidelberg, pp. 507–25
    • Wang, B., Li, B., Li, H., Knox: privacy-preserving auditing for shared data with large groups in the cloud. in “Proceedings of the 10th International Conference on Applied Cryptography and Network Security”, Springer-Verlag, Berlin, Heidelberg, pp. 507–25, 2012.
    • (2012)
    • Wang, B.1    Li, B.2    Li, H.3
  • 80
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • in “Proceedings of the 29th Conference on Information Communications”, IEEE Press, Piscataway, NJ, USA, pp. 525–33
    • Wang, C., Wang, Q., Ren, K., Lou, W., Privacy-preserving public auditing for data storage security in cloud computing. in “Proceedings of the 29th Conference on Information Communications”, IEEE Press, Piscataway, NJ, USA, pp. 525–33, 2010.
    • (2010)
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 81
    • 84890471117 scopus 로고    scopus 로고
    • Proxy provable data possession in public clouds
    • Wang, H., Proxy provable data possession in public clouds. IEEE Trans Serv Comput 6:4 (2013), 551–559.
    • (2013) IEEE Trans Serv Comput , vol.6 , Issue.4 , pp. 551-559
    • Wang, H.1
  • 82
    • 84995958719 scopus 로고    scopus 로고
    • Identity-based distributed provable data possession in multi-cloud storage
    • Services Computing, IEEE Transactions on PP(99), 1-1
    • Wang, H., Identity-based distributed provable data possession in multi-cloud storage. Services Computing, IEEE Transactions on PP(99), 1-1, 2014.
    • (2014)
    • Wang, H.1
  • 83
    • 84930643792 scopus 로고    scopus 로고
    • On the knowledge soundness of a cooperative provable data possession scheme in multicloud storage
    • Wang, H., Zhang, Y., On the knowledge soundness of a cooperative provable data possession scheme in multicloud storage. IEEE Trans Parallel Distr Syst 25:1 (2014), 264–267.
    • (2014) IEEE Trans Parallel Distr Syst , vol.25 , Issue.1 , pp. 264-267
    • Wang, H.1    Zhang, Y.2
  • 84
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing
    • in “Proceedings of the 14th European Conference on Research in Computer Security”, Springer-Verlag, Berlin, Heidelberg, pp. 355–70
    • Wang, Q., Wang, C., Li, J., Ren, K., Lou, W., Enabling public verifiability and data dynamics for storage security in cloud computing. in “Proceedings of the 14th European Conference on Research in Computer Security”, Springer-Verlag, Berlin, Heidelberg, pp. 355–70, 2009.
    • (2009)
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 85
    • 84889087663 scopus 로고    scopus 로고
    • Security and privacy for storage and computation in cloud computing
    • Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., et al. Security and privacy for storage and computation in cloud computing. Inf Sci 258 (2014), 371–386.
    • (2014) Inf Sci , vol.258 , pp. 371-386
    • Wei, L.1    Zhu, H.2    Cao, Z.3    Dong, X.4    Jia, W.5    Chen, Y.6
  • 86
    • 84868244288 scopus 로고    scopus 로고
    • Survey on cloud data integrity proof techniques
    • in “Information Security (Asia JCIS), 2012 Seventh Asia Joint Conference on”, pp. 85–91
    • Worku, S., Ting, Z., Zhi-Guang, Q., Survey on cloud data integrity proof techniques. in “Information Security (Asia JCIS), 2012 Seventh Asia Joint Conference on”, pp. 85–91, 2012.
    • (2012)
    • Worku, S.1    Ting, Z.2    Zhi-Guang, Q.3
  • 87
    • 84903982821 scopus 로고    scopus 로고
    • A secure document self-destruction scheme: an ABE approach
    • in “High Performance Computing and Communications 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on”, pp. 59–64
    • Xiong, J., Yao, Z., Ma, J., Liu, X., Li, Q., A secure document self-destruction scheme: an ABE approach. in “High Performance Computing and Communications 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on”, pp. 59–64, 2013.
    • (2013)
    • Xiong, J.1    Yao, Z.2    Ma, J.3    Liu, X.4    Li, Q.5
  • 88
    • 84871943322 scopus 로고    scopus 로고
    • Towards efficient proofs of retrievability
    • in “Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security”, ACM, New York, NY, USA, pp. 79–80
    • Xu, J., Chang, E.-C., Towards efficient proofs of retrievability. in “Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security”, ACM, New York, NY, USA, pp. 79–80, 2012.
    • (2012)
    • Xu, J.1    Chang, E.-C.2
  • 89
    • 84858284080 scopus 로고    scopus 로고
    • Data storage auditing service in cloud computing: challenges, methods and opportunities
    • Yang, K., Jia, X., Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web 15:4 (2012), 409–428.
    • (2012) World Wide Web , vol.15 , Issue.4 , pp. 409-428
    • Yang, K.1    Jia, X.2
  • 90
    • 84905266159 scopus 로고    scopus 로고
    • Improved security of a dynamic remote data possession checking protocol for cloud storage
    • Yu, Y., Ni, J., Au, M.H., Liu, H., Wang, H., Xu, C., Improved security of a dynamic remote data possession checking protocol for cloud storage. Expert Syst Appl 41:17 (2014), 7789–7796.
    • (2014) Expert Syst Appl , vol.41 , Issue.17 , pp. 7789-7796
    • Yu, Y.1    Ni, J.2    Au, M.H.3    Liu, H.4    Wang, H.5    Xu, C.6
  • 91
    • 84901671467 scopus 로고    scopus 로고
    • Improvement of a remote data possession checking protocol from algebraic signatures
    • Huang X. Zhou J. Springer International Publishing
    • Yu, Y., Ni, J., Ren, J., Wu, W., Chen, L., Xia, Q., Improvement of a remote data possession checking protocol from algebraic signatures. Huang, X., Zhou, J., (eds.) Information security practice and experience, 2014, Springer International Publishing, 359–372.
    • (2014) Information security practice and experience , pp. 359-372
    • Yu, Y.1    Ni, J.2    Ren, J.3    Wu, W.4    Chen, L.5    Xia, Q.6
  • 92
    • 84878475706 scopus 로고    scopus 로고
    • Proofs of retrievability with public verifiability and constant communication cost in cloud
    • in “Proceedings of the 2013 International Workshop on Security in Cloud Computing”, ACM, New York, NY, USA, pp. 19–26
    • Yuan, J., Yu, S., Proofs of retrievability with public verifiability and constant communication cost in cloud. in “Proceedings of the 2013 International Workshop on Security in Cloud Computing”, ACM, New York, NY, USA, pp. 19–26, 2013.
    • (2013)
    • Yuan, J.1    Yu, S.2
  • 93
    • 84877990370 scopus 로고    scopus 로고
    • SecLaaS: secure logging-as-a-service for cloud forensics
    • in “Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security”, ACM, New York, NY, USA, pp. 219–30
    • Zawoad, S., Dutta, A.K., Hasan, R., SecLaaS: secure logging-as-a-service for cloud forensics. in “Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security”, ACM, New York, NY, USA, pp. 219–30, 2013.
    • (2013)
    • Zawoad, S.1    Dutta, A.K.2    Hasan, R.3
  • 94
    • 84995899702 scopus 로고    scopus 로고
    • Towards building forensics enabled cloud through secure logging-as-a-service
    • in Dependable and Secure Computing, IEEE Transactions on, vol.PP, no.99, pp.1-1
    • Zawoad, S., Dutta, A., Hasan, R., Towards building forensics enabled cloud through secure logging-as-a-service. in Dependable and Secure Computing, IEEE Transactions on, vol.PP, no.99, pp.1-1, 2015.
    • (2015)
    • Zawoad, S.1    Dutta, A.2    Hasan, R.3
  • 95
    • 84877949385 scopus 로고    scopus 로고
    • Efficient dynamic provable possession of remote data via balanced update trees
    • in “Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security”, ACM, New York, NY, USA, pp. 183–94
    • Zhang, Y., Blanton, M., Efficient dynamic provable possession of remote data via balanced update trees. in “Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security”, ACM, New York, NY, USA, pp. 183–94, 2013.
    • (2013)
    • Zhang, Y.1    Blanton, M.2
  • 96
    • 79952791500 scopus 로고    scopus 로고
    • Fair and Dynamic Proofs of Retrievability
    • in “Proceedings of the First ACM Conference on Data and Application Security and Privacy”, ACM, New York, NY, USA, pp. 237–48
    • Zheng, Q., Xu, S., Fair and Dynamic Proofs of Retrievability. in “Proceedings of the First ACM Conference on Data and Application Security and Privacy”, ACM, New York, NY, USA, pp. 237–48, 2011.
    • (2011)
    • Zheng, Q.1    Xu, S.2
  • 97
    • 84858201794 scopus 로고    scopus 로고
    • Secure and Efficient Proof of Storage with Deduplication
    • in “Proceedings of the Second ACM Conference on Data and Application Security and Privacy”, ACM, New York, NY, USA, pp. 1–12
    • Zheng, Q., Xu, S., Secure and Efficient Proof of Storage with Deduplication. in “Proceedings of the Second ACM Conference on Data and Application Security and Privacy”, ACM, New York, NY, USA, pp. 1–12, 2012.
    • (2012)
    • Zheng, Q.1    Xu, S.2
  • 98
    • 84886077285 scopus 로고    scopus 로고
    • Service-generated big data and big data-as-a-service: an overview
    • in “Big Data (BigData Congress), 2013 IEEE International Congress on”, pp. 403–10
    • Zheng, Z., Zhu, J., Lyu, M., Service-generated big data and big data-as-a-service: an overview. in “Big Data (BigData Congress), 2013 IEEE International Congress on”, pp. 403–10, 2013.
    • (2013)
    • Zheng, Z.1    Zhu, J.2    Lyu, M.3
  • 99
    • 78650008717 scopus 로고    scopus 로고
    • Efficient provable data possession for hybrid clouds
    • in “Proceedings of the 17th ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 756–58
    • Zhu, Y., Wang, H., Hu, Z., Ahn, G.-J., Hu, H., Yau, S.S., Efficient provable data possession for hybrid clouds. in “Proceedings of the 17th ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 756–58, 2010.
    • (2010)
    • Zhu, Y.1    Wang, H.2    Hu, Z.3    Ahn, G.-J.4    Hu, H.5    Yau, S.S.6
  • 100
    • 84863270564 scopus 로고    scopus 로고
    • Collaborative integrity verification in hybrid clouds
    • in “Collaborative Computing: Networking, Applications and Work Sharing (CollaborateCom), 2011 7th International Conference on”, pp. 191–200
    • Zhu, Y., Hu, H., Ahn, G.-J., Han, Y., Chen, S., Collaborative integrity verification in hybrid clouds. in “Collaborative Computing: Networking, Applications and Work Sharing (CollaborateCom), 2011 7th International Conference on”, pp. 191–200, 2011.
    • (2011)
    • Zhu, Y.1    Hu, H.2    Ahn, G.-J.3    Han, Y.4    Chen, S.5
  • 101
    • 79959325063 scopus 로고    scopus 로고
    • Dynamic audit services for integrity verification of outsourced storages in clouds
    • in “Proceedings of the 2011 ACM Symposium on Applied Computing”, ACM, New York, NY, USA, pp. 1550–57
    • Zhu, Y., Wang, H., Hu, Z., Ahn, G.-J., Hu, H., Yau, S.S., Dynamic audit services for integrity verification of outsourced storages in clouds. in “Proceedings of the 2011 ACM Symposium on Applied Computing”, ACM, New York, NY, USA, pp. 1550–57, 2011.
    • (2011)
    • Zhu, Y.1    Wang, H.2    Hu, Z.3    Ahn, G.-J.4    Hu, H.5    Yau, S.S.6
  • 102
    • 84863498079 scopus 로고    scopus 로고
    • Efficient audit service outsourcing for data integrity in clouds
    • Zhu, Y., Hu, H., Ahn, G.-J., Yau, S.S., Efficient audit service outsourcing for data integrity in clouds. J Syst Softw 85:5 (2012), 1083–1095.
    • (2012) J Syst Softw , vol.85 , Issue.5 , pp. 1083-1095
    • Zhu, Y.1    Hu, H.2    Ahn, G.-J.3    Yau, S.S.4
  • 103
    • 84869466694 scopus 로고    scopus 로고
    • Cooperative provable data possession for integrity verification in multicloud storage
    • Zhu, Y., Hu, H., Ahn, G.-J., Yu, M., Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans Parallel Distr Syst 23:12 (2012), 2231–2244.
    • (2012) IEEE Trans Parallel Distr Syst , vol.23 , Issue.12 , pp. 2231-2244
    • Zhu, Y.1    Hu, H.2    Ahn, G.-J.3    Yu, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.