-
1
-
-
84861498357
-
Investigation of IT security and compliance challenges in security-as-a-service for cloud computing
-
in “Object/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW), 2012 15th IEEE International Symposium on”, pp. 124–29
-
Al-Aqrabi, H., Liu, L., Xu, J., Hill, R., Antonopoulos, N., Zhan, Y., Investigation of IT security and compliance challenges in security-as-a-service for cloud computing. in “Object/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW), 2012 15th IEEE International Symposium on”, pp. 124–29, 2012.
-
(2012)
-
-
Al-Aqrabi, H.1
Liu, L.2
Xu, J.3
Hill, R.4
Antonopoulos, N.5
Zhan, Y.6
-
2
-
-
84897104467
-
Enhanced GeoProof: improved geographic assurance for data in the cloud
-
Albeshri, A., Boyd, C., Nieto, J., Enhanced GeoProof: improved geographic assurance for data in the cloud. Int J Inf Secur 13:2 (2014), 191–198.
-
(2014)
Int J Inf Secur
, vol.13
, Issue.2
, pp. 191-198
-
-
Albeshri, A.1
Boyd, C.2
Nieto, J.3
-
3
-
-
79952914992
-
Using multi shares for ensuring privacy in database-as-a-service
-
in “System Sciences (HICSS), 2011 44th Hawaii International Conference on”, pp. 1–9
-
ALzain, M., Pardede, E., Using multi shares for ensuring privacy in database-as-a-service. in “System Sciences (HICSS), 2011 44th Hawaii International Conference on”, pp. 1–9, 2011.
-
(2011)
-
-
ALzain, M.1
Pardede, E.2
-
4
-
-
84880553279
-
secure database-as-a-service with Cipherbase
-
in “Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data”, ACM, New York, NY, USA, pp. 1033–36
-
Arasu, A., Blanas, S., Eguro, K., Joglekar, M., Kaushik, R., Kossmann, D., et al. secure database-as-a-service with Cipherbase. in “Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data”, ACM, New York, NY, USA, pp. 1033–36, 2013.
-
(2013)
-
-
Arasu, A.1
Blanas, S.2
Eguro, K.3
Joglekar, M.4
Kaushik, R.5
Kossmann, D.6
-
5
-
-
68249129760
-
“Above the clouds: a Berkeley view of cloud computing”(UCB/EECS-2009-28)
-
Technical report, EECS Department, University of California, Berkeley
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., et al. “Above the clouds: a Berkeley view of cloud computing”(UCB/EECS-2009-28). Technical report, EECS Department, University of California, Berkeley, 2009.
-
(2009)
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
-
6
-
-
74049102823
-
Provable data possession at untrusted stores
-
in “Proceedings of the 14th ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 598–609
-
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., et al. Provable data possession at untrusted stores. in “Proceedings of the 14th ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 598–609, 2007.
-
(2007)
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
-
7
-
-
70249129465
-
Scalable and efficient provable data possession
-
in “Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks”, ACM, New York, NY, USA, pp. 9:1–9:10
-
Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G., Scalable and efficient provable data possession. in “Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks”, ACM, New York, NY, USA, pp. 9:1–9:10, 2008.
-
(2008)
-
-
Ateniese, G.1
Di Pietro, R.2
Mancini, L.V.3
Tsudik, G.4
-
8
-
-
72449185582
-
Proofs of storage from homomorphic identification protocols
-
in “Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology”, Springer-Verlag, Berlin, Heidelberg, pp. 319–33
-
Ateniese, G., Kamara, S., Katz, J., Proofs of storage from homomorphic identification protocols. in “Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology”, Springer-Verlag, Berlin, Heidelberg, pp. 319–33, 2009.
-
(2009)
-
-
Ateniese, G.1
Kamara, S.2
Katz, J.3
-
9
-
-
79959823910
-
Remote data checking using provable data possession
-
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., et al. Remote data checking using provable data possession. ACM Trans Inf Syst Secur 14:1 (2011), 12:1–34.
-
(2011)
ACM Trans Inf Syst Secur
, vol.14
, Issue.1
, pp. 121-134
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Khan, O.5
Kissner, L.6
-
10
-
-
84863686692
-
Integrity verification of multiple data copies over untrusted cloud servers
-
in “Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (Ccgrid 2012)”, IEEE Computer Society, Washington, DC, USA, pp. 829–34
-
Barsoum, A.F., Hasan, M.A., Integrity verification of multiple data copies over untrusted cloud servers. in “Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (Ccgrid 2012)”, IEEE Computer Society, Washington, DC, USA, pp. 829–34, 2012.
-
(2012)
-
-
Barsoum, A.F.1
Hasan, M.A.2
-
11
-
-
85052022812
-
DupLESS: server-aided encryption for deduplicated storage
-
in “Proceedings of the 22Nd USENIX Conference on Security”, USENIX Association, Berkeley, CA, USA, pp. 179–94
-
Bellare, M., Keelveedhi, S., Ristenpart, T., DupLESS: server-aided encryption for deduplicated storage. in “Proceedings of the 22Nd USENIX Conference on Security”, USENIX Association, Berkeley, CA, USA, pp. 179–94, 2013.
-
(2013)
-
-
Bellare, M.1
Keelveedhi, S.2
Ristenpart, T.3
-
12
-
-
84883391608
-
Message-locked encryption and secure deduplication
-
T. Johansson P. Nguyen Springer Berlin Heidelberg
-
Bellare, M., Keelveedhi, S., Ristenpart, T., Message-locked encryption and secure deduplication. Johansson, T., Nguyen, P., (eds.) Advances in cryptology – EUROCRYPT 2013, 2013, Springer Berlin Heidelberg, 296–312.
-
(2013)
Advances in cryptology – EUROCRYPT 2013
, pp. 296-312
-
-
Bellare, M.1
Keelveedhi, S.2
Ristenpart, T.3
-
13
-
-
84858712240
-
Technical challenges of forensic investigations in cloud computing environments
-
Workshop on Cryptography and Security in Clouds
-
Birk, D., Technical challenges of forensic investigations in cloud computing environments. Workshop on Cryptography and Security in Clouds, 2011.
-
(2011)
-
-
Birk, D.1
-
14
-
-
74049144464
-
HAIL: a high-availability and integrity layer for cloud storage
-
in “Proceedings of the 16th ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 187–98
-
Bowers, K.D., Juels, A., Oprea, A., HAIL: a high-availability and integrity layer for cloud storage. in “Proceedings of the 16th ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 187–98, 2009.
-
(2009)
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
15
-
-
74049136395
-
Proofs of retrievability: theory and implementation
-
in “Proceedings of the 2009 ACM Workshop on Cloud Computing Security”, ACM, New York, NY, USA, pp. 43–54
-
Bowers, K.D., Juels, A., Oprea, A., Proofs of retrievability: theory and implementation. in “Proceedings of the 2009 ACM Workshop on Cloud Computing Security”, ACM, New York, NY, USA, pp. 43–54, 2009.
-
(2009)
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
16
-
-
84888994853
-
Policy-based secure deletion
-
in “Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 259–70
-
Cachin, C., Haralambiev, K., Hsiao, H.-C., Sorniotti, A., Policy-based secure deletion. in “Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 259–70, 2013.
-
(2013)
-
-
Cachin, C.1
Haralambiev, K.2
Hsiao, H.-C.3
Sorniotti, A.4
-
17
-
-
82655182931
-
Windows Azure Storage: a highly available cloud storage service with strong consistency
-
in “Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles”, ACM, New York, NY, USA, pp. 143–57
-
Calder, B., Wang, J., Ogus, A., Nilakantan, N., Skjolsvold, A., McKelvie, S., et al. Windows Azure Storage: a highly available cloud storage service with strong consistency. in “Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles”, ACM, New York, NY, USA, pp. 143–57, 2011.
-
(2011)
-
-
Calder, B.1
Wang, J.2
Ogus, A.3
Nilakantan, N.4
Skjolsvold, A.5
McKelvie, S.6
-
18
-
-
84883411598
-
Dynamic proofs of retrievability via oblivious RAM
-
T. Johansson P.Q. Nguyen Springer Berlin Heidelberg
-
Cash, D., Küpçü, A., Wichs, D., Dynamic proofs of retrievability via oblivious RAM. Johansson, T., Nguyen, P.Q., (eds.) Advances in cryptology – EUROCRYPT 2013, 2013, Springer Berlin Heidelberg, 279–295.
-
(2013)
Advances in cryptology – EUROCRYPT 2013
, pp. 279-295
-
-
Cash, D.1
Küpçü, A.2
Wichs, D.3
-
19
-
-
84903716872
-
A data assured deletion scheme in cloud storage
-
Chaoling, L., Yue, C., Yanzhou, Z., A data assured deletion scheme in cloud storage. IEEE Trans China Commun 11:4 (2014), 98–110.
-
(2014)
IEEE Trans China Commun
, vol.11
, Issue.4
, pp. 98-110
-
-
Chaoling, L.1
Yue, C.2
Yanzhou, Z.3
-
20
-
-
84866347734
-
Robust dynamic provable data possession
-
in “Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on”, pp. 515–25
-
Chen, B., Curtmola, R., Robust dynamic provable data possession. in “Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on”, pp. 515–25, 2012.
-
(2012)
-
-
Chen, B.1
Curtmola, R.2
-
21
-
-
84869445824
-
Robust dynamic remote data checking for public clouds
-
in “Proceedings of the 2012 ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 1043–45
-
Chen, B., Curtmola, R., Robust dynamic remote data checking for public clouds. in “Proceedings of the 2012 ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 1043–45, 2012.
-
(2012)
-
-
Chen, B.1
Curtmola, R.2
-
22
-
-
78650081896
-
Remote data checking for network coding-based distributed storage systems
-
in “Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop”, ACM, New York, NY, USA, pp. 31–42
-
Chen, B., Curtmola, R., Ateniese, G., Burns, R., Remote data checking for network coding-based distributed storage systems. in “Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop”, ACM, New York, NY, USA, pp. 31–42, 2010.
-
(2010)
-
-
Chen, B.1
Curtmola, R.2
Ateniese, G.3
Burns, R.4
-
23
-
-
84885645897
-
Using algebraic signatures to check data possession in cloud storage
-
Chen, L., Using algebraic signatures to check data possession in cloud storage. Future Gener Comput Syst 29:7 (2013), 1709–1715.
-
(2013)
Future Gener Comput Syst
, vol.29
, Issue.7
, pp. 1709-1715
-
-
Chen, L.1
-
24
-
-
84885662348
-
Data dynamics for remote data possession checking in cloud storage
-
Chen, L., Zhou, S., Huang, X., Xu, L., Data dynamics for remote data possession checking in cloud storage. Comput Electr Eng 39:7 (2013), 2413–2424.
-
(2013)
Comput Electr Eng
, vol.39
, Issue.7
, pp. 2413-2424
-
-
Chen, L.1
Zhou, S.2
Huang, X.3
Xu, L.4
-
25
-
-
84894098673
-
A hill cipher-based remote data possession checking in cloud storage
-
Chen, L., Guo, G., Peng, Z., A hill cipher-based remote data possession checking in cloud storage. Secur Commun Netw 7:3 (2014), 511–518.
-
(2014)
Secur Commun Netw
, vol.7
, Issue.3
, pp. 511-518
-
-
Chen, L.1
Guo, G.2
Peng, Z.3
-
26
-
-
74049093526
-
Controlling data in the cloud: outsourcing computation without outsourcing control
-
in “Proceedings of the 2009 ACM Workshop on Cloud Computing Security”, ACM, New York, NY, USA, pp. 85–90
-
Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., et al. Controlling data in the cloud: outsourcing computation without outsourcing control. in “Proceedings of the 2009 ACM Workshop on Cloud Computing Security”, ACM, New York, NY, USA, pp. 85–90, 2009.
-
(2009)
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
-
27
-
-
80053161148
-
Relational cloud: a database-as-a-service for the cloud
-
5th Biennial Conference on Innovative Data Systems Research, CIDR 2011, January 9–12, 2011 Asilomar, California
-
Curino, C., Jones, E.P.C., Popa, R.A., Malviya, N., Wu, E., Madden, S., et al. Relational cloud: a database-as-a-service for the cloud. 5th Biennial Conference on Innovative Data Systems Research, CIDR 2011, January 9–12, 2011 Asilomar, California, 2011.
-
(2011)
-
-
Curino, C.1
Jones, E.P.C.2
Popa, R.A.3
Malviya, N.4
Wu, E.5
Madden, S.6
-
28
-
-
70349245590
-
Robust remote data checking
-
in “Proceedings of the 4th ACM International Workshop on Storage Security and Survivability”, ACM, New York, NY, USA, pp. 63–68
-
Curtmola, R., Khan, O., Burns, R., Robust remote data checking. in “Proceedings of the 4th ACM International Workshop on Storage Security and Survivability”, ACM, New York, NY, USA, pp. 63–68, 2008.
-
(2008)
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
-
29
-
-
51849117195
-
MR-PDP: multiple-replica provable data possession
-
in “ICDCS ‘08 Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems”, pp. 411–20
-
Curtmola, R., Khan, O., Burns, R., Ateniese, G., MR-PDP: multiple-replica provable data possession. in “ICDCS ‘08 Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems”, pp. 411–20, 2008.
-
(2008)
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
-
30
-
-
84902475228
-
Remote integrity checking
-
S. Jajodia L. Strous Springer US Gazzoni, E. L.; Luiz, D.; Filho, G.; Sérgio, P.; Barreto, L. M. & Politécnica, E. (2006), “Demonstrating Data Possession and Uncheatable Data Transfer”
-
Deswarte, Y., Quisquater, J.-J., Saïdane, A., Remote integrity checking. Jajodia, S., Strous, L., (eds.) Integrity and internal control in information systems VI, 2004, Springer US, 1–11 Gazzoni, E. L.; Luiz, D.; Filho, G.; Sérgio, P.; Barreto, L. M. & Politécnica, E. (2006), “Demonstrating Data Possession and Uncheatable Data Transfer”.
-
(2004)
Integrity and internal control in information systems VI
, pp. 1-11
-
-
Deswarte, Y.1
Quisquater, J.-J.2
Saïdane, A.3
-
31
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
O. Reingold Springer Berlin Heidelberg
-
Dodis, Y., Vadhan, S., Wichs, D., Proofs of retrievability via hardness amplification. Reingold, O., (eds.) Theory of cryptography, 2009, Springer Berlin Heidelberg, 109–127.
-
(2009)
Theory of cryptography
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
32
-
-
74049121230
-
Dynamic provable data possession
-
in “Proceedings of the 16th ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 213–22
-
Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R., Dynamic provable data possession. in “Proceedings of the 16th ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 213–22, 2009.
-
(2009)
-
-
Erway, C.1
Küpçü, A.2
Papamanthou, C.3
Tamassia, R.4
-
33
-
-
84929150479
-
FlexDPDP: FlexList-based optimized dynamic provable data possession
-
Cryptology ePrint Archive, Report 2013/645; Available from: Accessed 10 July
-
Esiner, E., Kachkeev, A., Braunfeld, S., Küpçü, A., Özkasap, Ö., FlexDPDP: FlexList-based optimized dynamic provable data possession. Cryptology ePrint Archive, Report 2013/645; Available from: https://eprint.iacr.org/2013/645, 2015 Accessed 10 July.
-
(2015)
-
-
Esiner, E.1
Kachkeev, A.2
Braunfeld, S.3
Küpçü, A.4
Özkasap, Ö.5
-
34
-
-
84879854325
-
Transparent, distributed, and replicated dynamic provable data possession
-
in “Proceedings of the 11th International Conference on Applied Cryptography and Network Security”, Springer-Verlag, Berlin, Heidelberg, pp. 1–18
-
Etemad, M., Küpçü, A., Transparent, distributed, and replicated dynamic provable data possession. in “Proceedings of the 11th International Conference on Applied Cryptography and Network Security”, Springer-Verlag, Berlin, Heidelberg, pp. 1–18, 2013.
-
(2013)
-
-
Etemad, M.1
Küpçü, A.2
-
35
-
-
84869829459
-
LogOS: an automatic logging framework for service-oriented architectures
-
in “Software Engineering and Advanced Applications (SEAA), 2012 38th EUROMICRO Conference on”, pp. 224–227
-
Frenot, S., Ponge, J., LogOS: an automatic logging framework for service-oriented architectures. in “Software Engineering and Advanced Applications (SEAA), 2012 38th EUROMICRO Conference on”, pp. 224–227, 2012.
-
(2012)
-
-
Frenot, S.1
Ponge, J.2
-
36
-
-
84943390581
-
Trusted validation for geolocation of cloud data
-
Fu, D.L., Peng, X.G., Yang, Y.L., Trusted validation for geolocation of cloud data. Comput J, 2014, 10.1093/comjnl/bxu144.
-
(2014)
Comput J
-
-
Fu, D.L.1
Peng, X.G.2
Yang, Y.L.3
-
37
-
-
84874845364
-
Geolocation of data in the cloud
-
in “Proceedings of the Third ACM Conference on Data and Application Security and Privacy”, ACM, New York, NY, USA, pp. 25–36
-
Gondree, M., Peterson, Z.N., Geolocation of data in the cloud. in “Proceedings of the Third ACM Conference on Data and Application Security and Privacy”, ACM, New York, NY, USA, pp. 25–36, 2013.
-
(2013)
-
-
Gondree, M.1
Peterson, Z.N.2
-
38
-
-
84922430173
-
An efficient confidentiality-preserving proof of ownership for deduplication
-
González-Manzano, L., Orfila, A., An efficient confidentiality-preserving proof of ownership for deduplication. J Netw Comput Appl 50 (2015), 49–59.
-
(2015)
J Netw Comput Appl
, vol.50
, pp. 49-59
-
-
González-Manzano, L.1
Orfila, A.2
-
39
-
-
84891946061
-
Simplified File Assured Deletion (SFADE) – a user friendly overlay approach for data security in cloud storage system
-
in “Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on”, pp. 1640–44
-
Habib, A., Khanam, T., Palit, R., Simplified File Assured Deletion (SFADE) – a user friendly overlay approach for data security in cloud storage system. in “Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on”, pp. 1640–44, 2013.
-
(2013)
-
-
Habib, A.1
Khanam, T.2
Palit, R.3
-
40
-
-
84923872664
-
Provenance as a service: a data-centric approach for real-time monitoring
-
in “Big Data (BigData Congress), 2014 IEEE International Congress on”, pp. 258–65
-
Hammad, R., Wu, C.-S., Provenance as a service: a data-centric approach for real-time monitoring. in “Big Data (BigData Congress), 2014 IEEE International Congress on”, pp. 258–65, 2014.
-
(2014)
-
-
Hammad, R.1
Wu, C.-S.2
-
41
-
-
84901660429
-
Proofs of retrievability based on MRD codes
-
Huang X. Zhou J. Springer International Publishing
-
Han, S., Liu, S., Chen, K., Gu, D., Proofs of retrievability based on MRD codes. Huang, X., Zhou, J., (eds.) Information security practice and experience, 2014, Springer International Publishing, 330–345.
-
(2014)
Information security practice and experience
, pp. 330-345
-
-
Han, S.1
Liu, S.2
Chen, K.3
Gu, D.4
-
42
-
-
78650053109
-
Side channels in cloud services: deduplication in cloud storage
-
Harnik, D., Pinkas, B., Shulman-Peleg, A., Side channels in cloud services: deduplication in cloud storage. IEEE Secur Privacy 8:6 (2010), 40–47.
-
(2010)
IEEE Secur Privacy
, vol.8
, Issue.6
, pp. 40-47
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
43
-
-
85125956358
-
Location data, purpose binding and contextual integrity: what's the message?
-
L. Floridi Springer International Publishing
-
Hildebrandt, M., Location data, purpose binding and contextual integrity: what's the message?. Floridi, L., (eds.) Protection of information and the right to privacy – a new equilibrium?, 2014, Springer International Publishing, 31–62.
-
(2014)
Protection of information and the right to privacy – a new equilibrium?
, pp. 31-62
-
-
Hildebrandt, M.1
-
44
-
-
84857977072
-
SECaaS: security as a service for cloud-based applications
-
in “Proceedings of the Second Kuwait Conference on e-Services and e-Systems”, ACM, New York, NY, USA, pp. 8:1–8:4
-
Hussain, M., Abdulsalam, H., SECaaS: security as a service for cloud-based applications. in “Proceedings of the Second Kuwait Conference on e-Services and e-Systems”, ACM, New York, NY, USA, pp. 8:1–8:4, 2011.
-
(2011)
-
-
Hussain, M.1
Abdulsalam, H.2
-
45
-
-
84901649741
-
TIMER: secure and reliable cloud storage against data re-outsourcing
-
Huang X. Zhou J. Springer International Publishing
-
Jiang, T., Chen, X., Li, J., Wong, D., Ma, J., Liu, J., TIMER: secure and reliable cloud storage against data re-outsourcing. Huang, X., Zhou, J., (eds.) Information security practice and experience, 2014, Springer International Publishing, 346–358.
-
(2014)
Information security practice and experience
, pp. 346-358
-
-
Jiang, T.1
Chen, X.2
Li, J.3
Wong, D.4
Ma, J.5
Liu, J.6
-
46
-
-
36448941716
-
Guide to integrating forensic techniques into incident response
-
NIST Special Publication 800–86
-
Kent, K., Chevalier, S., Grance, T., Dang, H., Guide to integrating forensic techniques into incident response. NIST Special Publication, 2006 800–86.
-
(2006)
-
-
Kent, K.1
Chevalier, S.2
Grance, T.3
Dang, H.4
-
47
-
-
84881303788
-
Computation certification as a service in the cloud
-
Cluster, Cloud and Grid Computing (CCGrid), 2013 13th IEEE/ACM International Symposium on. IEEE
-
Khan, S.M., Hamlen, K.W., Computation certification as a service in the cloud. Cluster, Cloud and Grid Computing (CCGrid), 2013 13th IEEE/ACM International Symposium on. IEEE, 2013.
-
(2013)
-
-
Khan, S.M.1
Hamlen, K.W.2
-
48
-
-
84871533728
-
Proof of possession for cloud storage via lagrangian interpolation techniques
-
in “Proceedings of the 6th International Conference on Network and System Security”, Springer-Verlag, Berlin, Heidelberg, pp. 305–19
-
Krzywiecki, Ł., Kuty, M., Proof of possession for cloud storage via lagrangian interpolation techniques. in “Proceedings of the 6th International Conference on Network and System Security”, Springer-Verlag, Berlin, Heidelberg, pp. 305–19, 2012.
-
(2012)
-
-
Krzywiecki, Ł.1
Kuty, M.2
-
49
-
-
84901776042
-
A secure and efficient audit mechanism for dynamic shared data in cloud storage
-
Article ID 820391
-
Kwon, O., Koo, D., Shin, Y., Yoon, H., A secure and efficient audit mechanism for dynamic shared data in cloud storage. Scientific World J, 2014, 2014, 10.1155/2014/820391 Article ID 820391.
-
(2014)
Scientific World J
, vol.2014
-
-
Kwon, O.1
Koo, D.2
Shin, Y.3
Yoon, H.4
-
50
-
-
84919999045
-
Novel approach: deduplication for backup systems using data block size
-
L.C. Jain H.S. Behera J.K. Mandal D.P. Mohapatra Springer India
-
Latesh Kumar, K., Lawrance, R., Novel approach: deduplication for backup systems using data block size. Jain, L.C., Behera, H.S., Mandal, J.K., Mohapatra, D.P., (eds.) Computational intelligence in data mining, vol. 1, 2015, Springer India, 365–373.
-
(2015)
Computational intelligence in data mining
, vol.1
, pp. 365-373
-
-
Latesh Kumar, K.1
Lawrance, R.2
-
51
-
-
84863061194
-
Hybrid provable data possession at untrusted stores in cloud computing
-
in “Proceedings of the 2011 IEEE 17th International Conference on Parallel and Distributed Systems”, IEEE Computer Society, Washington, DC, USA, pp. 638–45
-
Lee, N.-Y., Chang, Y.-K., Hybrid provable data possession at untrusted stores in cloud computing. in “Proceedings of the 2011 IEEE 17th International Conference on Parallel and Distributed Systems”, IEEE Computer Society, Washington, DC, USA, pp. 638–45, 2011.
-
(2011)
-
-
Lee, N.-Y.1
Chang, Y.-K.2
-
52
-
-
84911424659
-
MuR-DPA: Top-down levelled multi-replica Merkle Hash Tree based secure public auditing for dynamic big data storage on cloud
-
Computers, IEEE Transactions on PP(99), 1-1
-
Liu, C., Ranjan, R., Yang, C., Zhang, X., Wang, L., Chen, J., MuR-DPA: Top-down levelled multi-replica Merkle Hash Tree based secure public auditing for dynamic big data storage on cloud. Computers, IEEE Transactions on PP(99), 1-1, 2014.
-
(2014)
-
-
Liu, C.1
Ranjan, R.2
Yang, C.3
Zhang, X.4
Wang, L.5
Chen, J.6
-
53
-
-
80055101722
-
An improved dynamic provable data possession model
-
in “Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on”, pp. 290–95
-
Liu, F., Gu, D., Lu, H., An improved dynamic provable data possession model. in “Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on”, pp. 290–95, 2011.
-
(2011)
-
-
Liu, F.1
Gu, D.2
Lu, H.3
-
54
-
-
80055104916
-
Ensuring the data integrity in cloud data storage
-
in “Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on”, pp. 240–43
-
Luo, W., Bai, G., Ensuring the data integrity in cloud data storage. in “Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on”, pp. 240–43, 2011.
-
(2011)
-
-
Luo, W.1
Bai, G.2
-
55
-
-
84860711960
-
mHealth data security: the need for HIPAA-compliant standardization
-
Luxton, D.D., Kayl, R.A., Mishkind, M.C., mHealth data security: the need for HIPAA-compliant standardization. Telemed J E Health 18:4 (2012), 284–288, 10.1089/tmj.2011.0180.
-
(2012)
Telemed J E Health
, vol.18
, Issue.4
, pp. 284-288
-
-
Luxton, D.D.1
Kayl, R.A.2
Mishkind, M.C.3
-
56
-
-
84939982695
-
Payment-based incentive mechanism for secure cloud deduplication
-
Miao, M., Jiang, T., You, I., Payment-based incentive mechanism for secure cloud deduplication. Int J Inf Manag 35:3 (2015), 379–386.
-
(2015)
Int J Inf Manag
, vol.35
, Issue.3
, pp. 379-386
-
-
Miao, M.1
Jiang, T.2
You, I.3
-
57
-
-
84868108920
-
Provable data possession using Sigma-protocols
-
in “Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on”, pp. 565–72
-
Mohan, A., Katti, R., Provable data possession using Sigma-protocols. in “Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on”, pp. 565–72, 2012.
-
(2012)
-
-
Mohan, A.1
Katti, R.2
-
58
-
-
84868311717
-
Privacy preserving delegated access control in the storage as a service model
-
in “Information Reuse and Integration (IRI), 2012 IEEE 13th International Conference on”, pp. 645–52.
-
Nabeel, M., Bertino, E., Privacy preserving delegated access control in the storage as a service model. in “Information Reuse and Integration (IRI), 2012 IEEE 13th International Conference on”, pp. 645–52. 2012.
-
(2012)
-
-
Nabeel, M.1
Bertino, E.2
-
59
-
-
80053145892
-
DIaaS: data integrity as a service in the cloud
-
Cloud Computing (CLOUD), 2011 IEEE International Conference on. IEEE
-
Nepal, S., Chen, S., Yao, K.J., Thilakanathan, D., DIaaS: data integrity as a service in the cloud. Cloud Computing (CLOUD), 2011 IEEE International Conference on. IEEE, 2011.
-
(2011)
-
-
Nepal, S.1
Chen, S.2
Yao, K.J.3
Thilakanathan, D.4
-
60
-
-
84858611385
-
Verifying remote data integrity in peer-to-peer data storage: a comprehensive survey of protocols
-
Oualha, N., Leneutre, J., Roudier, Y., Verifying remote data integrity in peer-to-peer data storage: a comprehensive survey of protocols. Peer Peer Netw Appl 5:3 (2012), 231–243.
-
(2012)
Peer Peer Netw Appl
, vol.5
, Issue.3
, pp. 231-243
-
-
Oualha, N.1
Leneutre, J.2
Roudier, Y.3
-
61
-
-
84922983644
-
Trusted geolocation-aware data placement in infrastructure clouds
-
in “Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on”, pp. 352–60
-
Paladi, N., Aslam, M., Gehrmann, C., Trusted geolocation-aware data placement in infrastructure clouds. in “Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on”, pp. 352–60, 2014.
-
(2014)
-
-
Paladi, N.1
Aslam, M.2
Gehrmann, C.3
-
62
-
-
84880237695
-
A position paper on data sovereignty: the importance of geolocating data in the cloud
-
in “Proceedings of the 3rd USENIX Conference on Hot Topics in Cloud Computing”, USENIX Association, Berkeley, CA, USA, pp. 9–9
-
Peterson, Z.N.J., Gondree, M., Beverly, R., A position paper on data sovereignty: the importance of geolocating data in the cloud. in “Proceedings of the 3rd USENIX Conference on Hot Topics in Cloud Computing”, USENIX Association, Berkeley, CA, USA, pp. 9–9, 2011.
-
(2011)
-
-
Peterson, Z.N.J.1
Gondree, M.2
Beverly, R.3
-
63
-
-
80955144922
-
Enabling security in cloud storage SLAs with CloudProof
-
in “Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference”, USENIX Association, Berkeley, CA, USA, pp. 31–31
-
Popa, R.A., Lorch, J.R., Molnar, D., Wang, H.J., Zhuang, L., Enabling security in cloud storage SLAs with CloudProof. in “Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference”, USENIX Association, Berkeley, CA, USA, pp. 31–31, 2011.
-
(2011)
-
-
Popa, R.A.1
Lorch, J.R.2
Molnar, D.3
Wang, H.J.4
Zhuang, L.5
-
64
-
-
80155161434
-
A secure cloud backup system with assured deletion and version control
-
in “Parallel Processing Workshops (ICPPW), 2011 40th International Conference on”, pp. 160–67
-
Rahumed, A., Chen, H., Tang, Y., Lee, P., Lui, J., A secure cloud backup system with assured deletion and version control. in “Parallel Processing Workshops (ICPPW), 2011 40th International Conference on”, pp. 160–67, 2011.
-
(2011)
-
-
Rahumed, A.1
Chen, H.2
Tang, Y.3
Lee, P.4
Lui, J.5
-
65
-
-
84995958117
-
Proof of retrieval and ownership protocols for enterprise-level data deduplication
-
in “Proceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research”, IBM Corp., Riverton, NJ, USA, pp. 81–90
-
Rashid, F., Miri, A., Woungang, I., Proof of retrieval and ownership protocols for enterprise-level data deduplication. in “Proceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research”, IBM Corp., Riverton, NJ, USA, pp. 81–90, 2013.
-
(2013)
-
-
Rashid, F.1
Miri, A.2
Woungang, I.3
-
66
-
-
84881251312
-
SoK: secure data deletion
-
in “Security and Privacy (SP), 2013 IEEE Symposium on”, pp. 301–15
-
Reardon, J., Basin, D., Capkun, S., SoK: secure data deletion. in “Security and Privacy (SP), 2013 IEEE Symposium on”, pp. 301–15, 2013.
-
(2013)
-
-
Reardon, J.1
Basin, D.2
Capkun, S.3
-
67
-
-
74049152260
-
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
-
in “Proceedings of the 16th ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 199–212
-
Ristenpart, T., Tromer, E., Shacham, H., Savage, S., Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. in “Proceedings of the 16th ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 199–212, 2009.
-
(2009)
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
68
-
-
84875940293
-
Proofs of Retrievability via Fountain Code
-
in “Proceedings of the 5th International Conference on Foundations and Practice of Security”, Springer-Verlag, Berlin, Heidelberg, pp. 18–32
-
Sarkar, S., Safavi-Naini, R., Proofs of Retrievability via Fountain Code. in “Proceedings of the 5th International Conference on Foundations and Practice of Security”, Springer-Verlag, Berlin, Heidelberg, pp. 18–32, 2013.
-
(2013)
-
-
Sarkar, S.1
Safavi-Naini, R.2
-
69
-
-
84871240221
-
Database as a service
-
Seibold, M., Kemper, A., Database as a service. Datenbank-Spektrum 12:1 (2012), 59–62.
-
(2012)
Datenbank-Spektrum
, vol.12
, Issue.1
, pp. 59-62
-
-
Seibold, M.1
Kemper, A.2
-
70
-
-
58349118819
-
Compact proofs of retrievability
-
J. Pieprzyk Springer Berlin Heidelberg
-
Shacham, H., Waters, B., Compact proofs of retrievability. Pieprzyk, J., (eds.) Advances in cryptology – ASIACRYPT 2008, 2008, Springer Berlin Heidelberg, 90–107.
-
(2008)
Advances in cryptology – ASIACRYPT 2008
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
71
-
-
81055144591
-
Delegable provable data possession for remote data in the clouds
-
in “Proceedings of the 13th International Conference on Information and Communications Security”, Springer-Verlag, Berlin, Heidelberg, pp. 93–111
-
Shen, S.-T., Tzeng, W.-G., Delegable provable data possession for remote data in the clouds. in “Proceedings of the 13th International Conference on Information and Communications Security”, Springer-Verlag, Berlin, Heidelberg, pp. 93–111, 2011.
-
(2011)
-
-
Shen, S.-T.1
Tzeng, W.-G.2
-
72
-
-
84888986259
-
Practical dynamic proofs of retrievability
-
in “Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 325–36
-
Shi, E., Stefanov, E., Papamanthou, C., Practical dynamic proofs of retrievability. in “Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 325–36, 2013.
-
(2013)
-
-
Shi, E.1
Stefanov, E.2
Papamanthou, C.3
-
73
-
-
84901607854
-
A review on remote data auditing in single cloud server: taxonomy and open issues
-
Sookhak, M., Talebian, H., Ahmed, E., Gani, A., Khan, M.K., A review on remote data auditing in single cloud server: taxonomy and open issues. J Netw Comput Appl 43 (2014), 121–141.
-
(2014)
J Netw Comput Appl
, vol.43
, pp. 121-141
-
-
Sookhak, M.1
Talebian, H.2
Ahmed, E.3
Gani, A.4
Khan, M.K.5
-
74
-
-
84874822744
-
Adaptive data protection in distributed systems
-
in “Proceedings of the Third ACM Conference on Data and Application Security and Privacy”, ACM, New York, NY, USA, pp. 365–76
-
Squicciarini, A.C., Petracca, G., Bertino, E., Adaptive data protection in distributed systems. in “Proceedings of the Third ACM Conference on Data and Application Security and Privacy”, ACM, New York, NY, USA, pp. 365–76, 2013.
-
(2013)
-
-
Squicciarini, A.C.1
Petracca, G.2
Bertino, E.3
-
75
-
-
84872103252
-
Iris: a scalable cloud file system with efficient integrity checks
-
in “Proceedings of the 28th Annual Computer Security Applications Conference”, ACM, New York, NY, USA, pp. 229–38
-
Stefanov, E., van Dijk, M., Juels, A., Oprea, A., Iris: a scalable cloud file system with efficient integrity checks. in “Proceedings of the 28th Annual Computer Security Applications Conference”, ACM, New York, NY, USA, pp. 229–38, 2012.
-
(2012)
-
-
Stefanov, E.1
van Dijk, M.2
Juels, A.3
Oprea, A.4
-
76
-
-
84861176850
-
Ensuring distributed accountability for data sharing in the cloud
-
Sundareswaran, S., Squicciarini, A., Lin, D., Ensuring distributed accountability for data sharing in the cloud. IEEE Trans Dependable Secure Comput 9:4 (2012), 556–568.
-
(2012)
IEEE Trans Dependable Secure Comput
, vol.9
, Issue.4
, pp. 556-568
-
-
Sundareswaran, S.1
Squicciarini, A.2
Lin, D.3
-
77
-
-
84866619747
-
Secure overlay cloud storage with access control and assured deletion
-
Tang, Y., Lee, P., Lui, J., Perlman, R., Secure overlay cloud storage with access control and assured deletion. IEEE Trans Dependable Secure Comput 9:6 (2012), 903–916.
-
(2012)
IEEE Trans Dependable Secure Comput
, vol.9
, Issue.6
, pp. 903-916
-
-
Tang, Y.1
Lee, P.2
Lui, J.3
Perlman, R.4
-
78
-
-
84874832699
-
Multi-user dynamic proofs of data possession using trusted hardware
-
in “Proceedings of the Third ACM Conference on Data and Application Security and Privacy”, ACM, New York, NY, USA, pp. 353–64
-
Tate, S.R., Vishwanathan, R., Everhart, L., Multi-user dynamic proofs of data possession using trusted hardware. in “Proceedings of the Third ACM Conference on Data and Application Security and Privacy”, ACM, New York, NY, USA, pp. 353–64, 2013.
-
(2013)
-
-
Tate, S.R.1
Vishwanathan, R.2
Everhart, L.3
-
79
-
-
84863472230
-
Knox: privacy-preserving auditing for shared data with large groups in the cloud
-
in “Proceedings of the 10th International Conference on Applied Cryptography and Network Security”, Springer-Verlag, Berlin, Heidelberg, pp. 507–25
-
Wang, B., Li, B., Li, H., Knox: privacy-preserving auditing for shared data with large groups in the cloud. in “Proceedings of the 10th International Conference on Applied Cryptography and Network Security”, Springer-Verlag, Berlin, Heidelberg, pp. 507–25, 2012.
-
(2012)
-
-
Wang, B.1
Li, B.2
Li, H.3
-
80
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
in “Proceedings of the 29th Conference on Information Communications”, IEEE Press, Piscataway, NJ, USA, pp. 525–33
-
Wang, C., Wang, Q., Ren, K., Lou, W., Privacy-preserving public auditing for data storage security in cloud computing. in “Proceedings of the 29th Conference on Information Communications”, IEEE Press, Piscataway, NJ, USA, pp. 525–33, 2010.
-
(2010)
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
81
-
-
84890471117
-
Proxy provable data possession in public clouds
-
Wang, H., Proxy provable data possession in public clouds. IEEE Trans Serv Comput 6:4 (2013), 551–559.
-
(2013)
IEEE Trans Serv Comput
, vol.6
, Issue.4
, pp. 551-559
-
-
Wang, H.1
-
82
-
-
84995958719
-
Identity-based distributed provable data possession in multi-cloud storage
-
Services Computing, IEEE Transactions on PP(99), 1-1
-
Wang, H., Identity-based distributed provable data possession in multi-cloud storage. Services Computing, IEEE Transactions on PP(99), 1-1, 2014.
-
(2014)
-
-
Wang, H.1
-
83
-
-
84930643792
-
On the knowledge soundness of a cooperative provable data possession scheme in multicloud storage
-
Wang, H., Zhang, Y., On the knowledge soundness of a cooperative provable data possession scheme in multicloud storage. IEEE Trans Parallel Distr Syst 25:1 (2014), 264–267.
-
(2014)
IEEE Trans Parallel Distr Syst
, vol.25
, Issue.1
, pp. 264-267
-
-
Wang, H.1
Zhang, Y.2
-
84
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
in “Proceedings of the 14th European Conference on Research in Computer Security”, Springer-Verlag, Berlin, Heidelberg, pp. 355–70
-
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W., Enabling public verifiability and data dynamics for storage security in cloud computing. in “Proceedings of the 14th European Conference on Research in Computer Security”, Springer-Verlag, Berlin, Heidelberg, pp. 355–70, 2009.
-
(2009)
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
85
-
-
84889087663
-
Security and privacy for storage and computation in cloud computing
-
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., et al. Security and privacy for storage and computation in cloud computing. Inf Sci 258 (2014), 371–386.
-
(2014)
Inf Sci
, vol.258
, pp. 371-386
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Dong, X.4
Jia, W.5
Chen, Y.6
-
86
-
-
84868244288
-
Survey on cloud data integrity proof techniques
-
in “Information Security (Asia JCIS), 2012 Seventh Asia Joint Conference on”, pp. 85–91
-
Worku, S., Ting, Z., Zhi-Guang, Q., Survey on cloud data integrity proof techniques. in “Information Security (Asia JCIS), 2012 Seventh Asia Joint Conference on”, pp. 85–91, 2012.
-
(2012)
-
-
Worku, S.1
Ting, Z.2
Zhi-Guang, Q.3
-
87
-
-
84903982821
-
A secure document self-destruction scheme: an ABE approach
-
in “High Performance Computing and Communications 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on”, pp. 59–64
-
Xiong, J., Yao, Z., Ma, J., Liu, X., Li, Q., A secure document self-destruction scheme: an ABE approach. in “High Performance Computing and Communications 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on”, pp. 59–64, 2013.
-
(2013)
-
-
Xiong, J.1
Yao, Z.2
Ma, J.3
Liu, X.4
Li, Q.5
-
88
-
-
84871943322
-
Towards efficient proofs of retrievability
-
in “Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security”, ACM, New York, NY, USA, pp. 79–80
-
Xu, J., Chang, E.-C., Towards efficient proofs of retrievability. in “Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security”, ACM, New York, NY, USA, pp. 79–80, 2012.
-
(2012)
-
-
Xu, J.1
Chang, E.-C.2
-
89
-
-
84858284080
-
Data storage auditing service in cloud computing: challenges, methods and opportunities
-
Yang, K., Jia, X., Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web 15:4 (2012), 409–428.
-
(2012)
World Wide Web
, vol.15
, Issue.4
, pp. 409-428
-
-
Yang, K.1
Jia, X.2
-
90
-
-
84905266159
-
Improved security of a dynamic remote data possession checking protocol for cloud storage
-
Yu, Y., Ni, J., Au, M.H., Liu, H., Wang, H., Xu, C., Improved security of a dynamic remote data possession checking protocol for cloud storage. Expert Syst Appl 41:17 (2014), 7789–7796.
-
(2014)
Expert Syst Appl
, vol.41
, Issue.17
, pp. 7789-7796
-
-
Yu, Y.1
Ni, J.2
Au, M.H.3
Liu, H.4
Wang, H.5
Xu, C.6
-
91
-
-
84901671467
-
Improvement of a remote data possession checking protocol from algebraic signatures
-
Huang X. Zhou J. Springer International Publishing
-
Yu, Y., Ni, J., Ren, J., Wu, W., Chen, L., Xia, Q., Improvement of a remote data possession checking protocol from algebraic signatures. Huang, X., Zhou, J., (eds.) Information security practice and experience, 2014, Springer International Publishing, 359–372.
-
(2014)
Information security practice and experience
, pp. 359-372
-
-
Yu, Y.1
Ni, J.2
Ren, J.3
Wu, W.4
Chen, L.5
Xia, Q.6
-
92
-
-
84878475706
-
Proofs of retrievability with public verifiability and constant communication cost in cloud
-
in “Proceedings of the 2013 International Workshop on Security in Cloud Computing”, ACM, New York, NY, USA, pp. 19–26
-
Yuan, J., Yu, S., Proofs of retrievability with public verifiability and constant communication cost in cloud. in “Proceedings of the 2013 International Workshop on Security in Cloud Computing”, ACM, New York, NY, USA, pp. 19–26, 2013.
-
(2013)
-
-
Yuan, J.1
Yu, S.2
-
93
-
-
84877990370
-
SecLaaS: secure logging-as-a-service for cloud forensics
-
in “Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security”, ACM, New York, NY, USA, pp. 219–30
-
Zawoad, S., Dutta, A.K., Hasan, R., SecLaaS: secure logging-as-a-service for cloud forensics. in “Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security”, ACM, New York, NY, USA, pp. 219–30, 2013.
-
(2013)
-
-
Zawoad, S.1
Dutta, A.K.2
Hasan, R.3
-
94
-
-
84995899702
-
Towards building forensics enabled cloud through secure logging-as-a-service
-
in Dependable and Secure Computing, IEEE Transactions on, vol.PP, no.99, pp.1-1
-
Zawoad, S., Dutta, A., Hasan, R., Towards building forensics enabled cloud through secure logging-as-a-service. in Dependable and Secure Computing, IEEE Transactions on, vol.PP, no.99, pp.1-1, 2015.
-
(2015)
-
-
Zawoad, S.1
Dutta, A.2
Hasan, R.3
-
95
-
-
84877949385
-
Efficient dynamic provable possession of remote data via balanced update trees
-
in “Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security”, ACM, New York, NY, USA, pp. 183–94
-
Zhang, Y., Blanton, M., Efficient dynamic provable possession of remote data via balanced update trees. in “Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security”, ACM, New York, NY, USA, pp. 183–94, 2013.
-
(2013)
-
-
Zhang, Y.1
Blanton, M.2
-
96
-
-
79952791500
-
Fair and Dynamic Proofs of Retrievability
-
in “Proceedings of the First ACM Conference on Data and Application Security and Privacy”, ACM, New York, NY, USA, pp. 237–48
-
Zheng, Q., Xu, S., Fair and Dynamic Proofs of Retrievability. in “Proceedings of the First ACM Conference on Data and Application Security and Privacy”, ACM, New York, NY, USA, pp. 237–48, 2011.
-
(2011)
-
-
Zheng, Q.1
Xu, S.2
-
97
-
-
84858201794
-
Secure and Efficient Proof of Storage with Deduplication
-
in “Proceedings of the Second ACM Conference on Data and Application Security and Privacy”, ACM, New York, NY, USA, pp. 1–12
-
Zheng, Q., Xu, S., Secure and Efficient Proof of Storage with Deduplication. in “Proceedings of the Second ACM Conference on Data and Application Security and Privacy”, ACM, New York, NY, USA, pp. 1–12, 2012.
-
(2012)
-
-
Zheng, Q.1
Xu, S.2
-
98
-
-
84886077285
-
Service-generated big data and big data-as-a-service: an overview
-
in “Big Data (BigData Congress), 2013 IEEE International Congress on”, pp. 403–10
-
Zheng, Z., Zhu, J., Lyu, M., Service-generated big data and big data-as-a-service: an overview. in “Big Data (BigData Congress), 2013 IEEE International Congress on”, pp. 403–10, 2013.
-
(2013)
-
-
Zheng, Z.1
Zhu, J.2
Lyu, M.3
-
99
-
-
78650008717
-
Efficient provable data possession for hybrid clouds
-
in “Proceedings of the 17th ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 756–58
-
Zhu, Y., Wang, H., Hu, Z., Ahn, G.-J., Hu, H., Yau, S.S., Efficient provable data possession for hybrid clouds. in “Proceedings of the 17th ACM Conference on Computer and Communications Security”, ACM, New York, NY, USA, pp. 756–58, 2010.
-
(2010)
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.-J.4
Hu, H.5
Yau, S.S.6
-
100
-
-
84863270564
-
Collaborative integrity verification in hybrid clouds
-
in “Collaborative Computing: Networking, Applications and Work Sharing (CollaborateCom), 2011 7th International Conference on”, pp. 191–200
-
Zhu, Y., Hu, H., Ahn, G.-J., Han, Y., Chen, S., Collaborative integrity verification in hybrid clouds. in “Collaborative Computing: Networking, Applications and Work Sharing (CollaborateCom), 2011 7th International Conference on”, pp. 191–200, 2011.
-
(2011)
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.-J.3
Han, Y.4
Chen, S.5
-
101
-
-
79959325063
-
Dynamic audit services for integrity verification of outsourced storages in clouds
-
in “Proceedings of the 2011 ACM Symposium on Applied Computing”, ACM, New York, NY, USA, pp. 1550–57
-
Zhu, Y., Wang, H., Hu, Z., Ahn, G.-J., Hu, H., Yau, S.S., Dynamic audit services for integrity verification of outsourced storages in clouds. in “Proceedings of the 2011 ACM Symposium on Applied Computing”, ACM, New York, NY, USA, pp. 1550–57, 2011.
-
(2011)
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.-J.4
Hu, H.5
Yau, S.S.6
-
102
-
-
84863498079
-
Efficient audit service outsourcing for data integrity in clouds
-
Zhu, Y., Hu, H., Ahn, G.-J., Yau, S.S., Efficient audit service outsourcing for data integrity in clouds. J Syst Softw 85:5 (2012), 1083–1095.
-
(2012)
J Syst Softw
, vol.85
, Issue.5
, pp. 1083-1095
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.-J.3
Yau, S.S.4
-
103
-
-
84869466694
-
Cooperative provable data possession for integrity verification in multicloud storage
-
Zhu, Y., Hu, H., Ahn, G.-J., Yu, M., Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans Parallel Distr Syst 23:12 (2012), 2231–2244.
-
(2012)
IEEE Trans Parallel Distr Syst
, vol.23
, Issue.12
, pp. 2231-2244
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.-J.3
Yu, M.4
|