메뉴 건너뛰기




Volumn 65, Issue 12, 2016, Pages 3631-3645

DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments

Author keywords

Cloud storage; deduplication; dynamic proof of storage

Indexed keywords

COMPUTER SCIENCE; SOFTWARE ENGINEERING;

EID: 84998890585     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2016.2560812     Document Type: Article
Times cited : (67)

References (48)
  • 2
    • 84962448916 scopus 로고    scopus 로고
    • A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
    • Feb.
    • Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340-352, Feb. 2016.
    • (2016) IEEE Trans. Parallel Distrib. Syst. , vol.27 , Issue.2 , pp. 340-352
    • Xia, Z.1    Wang, X.2    Sun, X.3    Wang, Q.4
  • 3
    • 84877272118 scopus 로고    scopus 로고
    • Security and privacy in cloud computing
    • Jul.
    • Z. Xiao and Y. Xiao, "Security and privacy in cloud computing," IEEE Commun. Surveys Tuts., vol. 15, no. 2, pp. 843-859, Jul. 2013.
    • (2013) IEEE Commun. Surveys Tuts. , vol.15 , Issue.2 , pp. 843-859
    • Xiao, Z.1    Xiao, Y.2
  • 4
    • 84938346780 scopus 로고    scopus 로고
    • From security to assurance in the cloud: A survey
    • C. A. Ardagna, R. Asal, E. Damiani, and Q. H. Vu, "From security to assurance in the cloud: A survey," ACM Comput. Surv., vol. 48, no. 1, pp. 2:1-2:50, 2015.
    • (2015) ACM Comput. Surv. , vol.48 , Issue.1 , pp. 1-50
    • Ardagna, C.A.1    Asal, R.2    Damiani, E.3    Vu, Q.H.4
  • 10
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing
    • Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public verifiability and data dynamics for storage security in cloud computing," in Proc. 14th Eur. Conf. Res. Comput. Security, 2009, pp. 355-370.
    • (2009) Proc. 14th Eur. Conf. Res. Comput. Security , pp. 355-370
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 12
    • 84878998883 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • H. Shacham and B. Waters, "Compact proofs of retrievability," J. Cryptol., vol. 26, no. 3, pp. 442-483, 2013.
    • (2013) J. Cryptol. , vol.26 , Issue.3 , pp. 442-483
    • Shacham, H.1    Waters, B.2
  • 13
    • 84871950907 scopus 로고    scopus 로고
    • A dynamic proof of retrievability (PoR) scheme with O(logn) complexity
    • Z. Mo, Y. Zhou, and S. Chen, "A dynamic proof of retrievability (PoR) scheme with O(logn) complexity," in Proc. IEEE Int. Conf. Commun., 2012, pp. 912-916.
    • (2012) Proc. IEEE Int. Conf. Commun. , pp. 912-916
    • Mo, Z.1    Zhou, Y.2    Chen, S.3
  • 21
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing," in Proc. INFOCOM, 2010, pp. 1-9.
    • (2010) Proc. INFOCOM , pp. 1-9
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 23
    • 84869466694 scopus 로고    scopus 로고
    • Cooperative provable data possession for integrity verification in multicloud storage
    • Feb.
    • Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, "Cooperative provable data possession for integrity verification in multicloud storage," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 12, pp. 2231-2244, Feb. 2012.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.12 , pp. 2231-2244
    • Zhu, Y.1    Hu, H.2    Ahn, G.-J.3    Yu, M.4
  • 25
    • 84967222608 scopus 로고    scopus 로고
    • Regeneratingcodes-based efficient remote data checking and repairing in cloud storage
    • J. Chen, Y. Peng, R. Du, Q. Yuan, and M. Zheng, "Regeneratingcodes-based efficient remote data checking and repairing in cloud storage," in Proc. TrustCom, 2015, pp. 143-150.
    • (2015) Proc. TrustCom , pp. 143-150
    • Chen, J.1    Peng, Y.2    Du, R.3    Yuan, Q.4    Zheng, M.5
  • 27
    • 84883411598 scopus 로고    scopus 로고
    • Dynamic proofs of retrievability via oblivious RAM
    • D. Cash, A. Küpçü, and D. Wichs, "Dynamic proofs of retrievability via oblivious RAM," in Proc. EUROCRYPT, 2013, pp. 279-295.
    • (2013) Proc. EUROCRYPT , pp. 279-295
    • Cash, D.1    Küpçü, A.2    Wichs, D.3
  • 29
    • 85100706388 scopus 로고    scopus 로고
    • Dynamic proofs of retrievability for coded cloud storage systems
    • Z. Ren, L. Wang, Q. Wang, and M. Xu, "Dynamic proofs of retrievability for coded cloud storage systems," IEEE Trans. Serv. Comput., 2015, Doi: 10.1109/TSC.2015.2481880.
    • (2015) IEEE Trans. Serv. Comput.
    • Ren, Z.1    Wang, L.2    Wang, Q.3    Xu, M.4
  • 30
    • 84871949666 scopus 로고    scopus 로고
    • Boosting efficiency and security in proof of ownership for deduplication
    • R. Di Pietro and A. Sorniotti, "Boosting efficiency and security in proof of ownership for deduplication," in Proc. ASIACCS, 2012, pp. 81-82.
    • (2012) Proc. ASIACCS , pp. 81-82
    • Di Pietro, R.1    Sorniotti, A.2
  • 31
    • 84877968673 scopus 로고    scopus 로고
    • Weak leakage-resilient clientside deduplication of encrypted data in cloud storage
    • J. Xu, E.-C. Chang, and J. Zhou, "Weak leakage-resilient clientside deduplication of encrypted data in cloud storage," in Proc. 8th ACM Symp. Inf., Comput. Commun. Security, 2013, pp. 195-206.
    • (2013) Proc. 8th ACM Symp. Inf., Comput. Commun. Security , pp. 195-206
    • Xu, J.1    Chang, E.-C.2    Zhou, J.3
  • 33
    • 84901032811 scopus 로고    scopus 로고
    • Secure deduplication with efficient and reliable convergent key management
    • Nov.
    • J. Li, et al., "Secure deduplication with efficient and reliable convergent key management," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 6, pp. 1615-1625, Nov. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.6 , pp. 1615-1625
    • Li, J.1
  • 34
    • 84927584035 scopus 로고    scopus 로고
    • A hybrid cloud approach for secure authorized deduplication
    • May
    • J. Li, Y. K. Li, X. Chen, P. Lee, and W. Lou, "A hybrid cloud approach for secure authorized deduplication," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 5, pp. 1206-1216, May 2015.
    • (2015) IEEE Trans. Parallel Distrib. Syst. , vol.26 , Issue.5 , pp. 1206-1216
    • Li, J.1    Li, Y.K.2    Chen, X.3    Lee, P.4    Lou, W.5
  • 37
    • 84883057189 scopus 로고    scopus 로고
    • Public auditing for shared data with efficient user revocation in the cloud
    • B. Wang, B. Li, and H. Li, "Public auditing for shared data with efficient user revocation in the cloud," in Proc. INFOCOM, 2013, pp. 2904-2912.
    • (2013) Proc. INFOCOM , pp. 2904-2912
    • Wang, B.1    Li, B.2    Li, H.3
  • 38
    • 84922271700 scopus 로고    scopus 로고
    • Oruta: Privacy-preserving public auditing for shared data in the cloud
    • Jan.-Mar.
    • B. Wang, B. Li, and H. Li, "Oruta: Privacy-preserving public auditing for shared data in the cloud," IEEE Trans. Cloud Comput., vol. 2, no. 1, pp. 43-56, Jan.-Mar. 2014.
    • (2014) IEEE Trans. Cloud Comput. , vol.2 , Issue.1 , pp. 43-56
    • Wang, B.1    Li, B.2    Li, H.3
  • 39
    • 84904430603 scopus 로고    scopus 로고
    • Efficient public integrity checking for cloud data sharing with multi-user modification
    • J. Yuan and S. Yu, "Efficient public integrity checking for cloud data sharing with multi-user modification," in Proc. INFOCOM, 2014, pp. 2121-2129.
    • (2014) Proc. INFOCOM , pp. 2121-2129
    • Yuan, J.1    Yu, S.2
  • 42
    • 84905409138 scopus 로고    scopus 로고
    • Homomorphic signatures with efficient verification for polynomial functions
    • D. Catalano, D. Fiore, and B. Warinschi, "Homomorphic signatures with efficient verification for polynomial functions," in Proc. 34th Annu. Cryptology Conf., 2014, pp. 371-389.
    • (2014) Proc. 34th Annu. Cryptology Conf. , pp. 371-389
    • Catalano, D.1    Fiore, D.2    Warinschi, B.3
  • 43
    • 77955178649 scopus 로고    scopus 로고
    • On homomorphic signatures for network coding
    • Apr.
    • A. Yun, J. H. Cheon, and Y. Kim, "On homomorphic signatures for network coding," IEEE Trans. Comput., vol. 59, no. 9, pp. 1295-1296, Apr. 2010.
    • (2010) IEEE Trans. Comput. , vol.59 , Issue.9 , pp. 1295-1296
    • Yun, A.1    Cheon, J.H.2    Kim, Y.3
  • 44
    • 84883413291 scopus 로고    scopus 로고
    • An efficient homomorphic MAC with small key size for authentication in network coding
    • Jun.
    • C. Cheng and T. Jiang, "An efficient homomorphic MAC with small key size for authentication in network coding," IEEE Trans. Comput., vol. 62, no. 10, pp. 2096-2100, Jun. 2013.
    • (2013) IEEE Trans. Comput. , vol.62 , Issue.10 , pp. 2096-2100
    • Cheng, C.1    Jiang, T.2
  • 45
    • 84921441831 scopus 로고    scopus 로고
    • Dominating set and network coding-based routing in wireless mesh networks
    • Dec.
    • J. Chen, et al., "Dominating set and network coding-based routing in wireless mesh networks," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 2, pp. 423-433, Dec. 2015.
    • (2015) IEEE Trans. Parallel Distrib. Syst. , vol.26 , Issue.2 , pp. 423-433
    • Chen, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.