메뉴 건너뛰기




Volumn 82, Issue , 2017, Pages 56-64

Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium

Author keywords

Cloud storage; Cloud storage auditing; Data security; Privacy preserving

Indexed keywords

DIGITAL STORAGE; SECURITY OF DATA;

EID: 85010190520     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2017.01.015     Document Type: Article
Times cited : (93)

References (32)
  • 2
    • 0142156713 scopus 로고    scopus 로고
    • Variations of Diffie-Hellman problem
    • Bao, F., Deng, R., Zhu, H., 2003. Variations of Diffie-Hellman problem. In: Proceedings of the ICICS 2003. pp. 301–312.
    • (2003) Proceedings of the ICIC , pp. 301-312
    • Bao, F.1    Deng, R.2    Zhu, H.3
  • 3
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • Boneh, D., Lynn, B., Shacham, H., Short signatures from the weil pairing. J. Cryptol. 17:4 (2004), 297–319.
    • (2004) J. Cryptol. , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 4
    • 84861630520 scopus 로고    scopus 로고
    • LT codes-based secure and reliable cloud storage service
    • In: March 25–30, 2012
    • Cao, N., Yu, S., Yang, Z., Lou, W., Hou, Y.T., 2012. LT codes-based secure and reliable cloud storage service. In: Proceedings of the IEEE INFOCOM 2012. March 25–30, 2012, pp. 693–701.
    • (2012) Proceedings of the IEEE INFOCOM 2012 , pp. 693-701
    • Cao, N.1    Yu, S.2    Yang, Z.3    Lou, W.4    Hou, Y.T.5
  • 5
    • 84991088919 scopus 로고    scopus 로고
    • Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement
    • Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K., Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11:12 (2016), 2706–2716.
    • (2016) IEEE Trans. Inf. Forensics Secur. , vol.11 , Issue.12 , pp. 2706-2716
    • Fu, Z.1    Wu, X.2    Guan, C.3    Sun, X.4    Ren, K.5
  • 6
    • 84982135416 scopus 로고    scopus 로고
    • Enabling personalized search over encrypted outsourced data with efficiency improvement
    • Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F., Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27:9 (2016), 2546–2559.
    • (2016) IEEE Trans. Parallel Distrib. Syst. , vol.27 , Issue.9 , pp. 2546-2559
    • Fu, Z.1    Ren, K.2    Shu, J.3    Sun, X.4    Huang, F.5
  • 7
    • 85077359111 scopus 로고    scopus 로고
    • Enabling semantic search based on conceptual graphs over encrypted outsourced data
    • Fu, Z., Huang, F., Sun, X., Vasilakos, A., Yang, C., Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Serv. Comput., 2016, 10.1109/TSC.2016.2622697.
    • (2016) IEEE Trans. Serv. Comput.
    • Fu, Z.1    Huang, F.2    Sun, X.3    Vasilakos, A.4    Yang, C.5
  • 9
    • 0002670834 scopus 로고    scopus 로고
    • Message recovery for signature schemes based on the discrete logarithm problem
    • Kaisa, N., Rueppel, R., Message recovery for signature schemes based on the discrete logarithm problem. Des. Codes Cryptogr. 7:1 (1996), 61–81.
    • (1996) Des. Codes Cryptogr. , vol.7 , Issue.1 , pp. 61-81
    • Kaisa, N.1    Rueppel, R.2
  • 10
    • 84933037073 scopus 로고    scopus 로고
    • OPoR: enabling proof of retrievability in cloud computing with resource-constrained devices
    • Li, J., Tan, X., Chen, X., Wong, D.S., Xhafa, Fatos, OPoR: enabling proof of retrievability in cloud computing with resource-constrained devices. Cloud Comput. 3:2 (2014), 195–205.
    • (2014) Cloud Comput. , vol.3 , Issue.2 , pp. 195-205
    • Li, J.1    Tan, X.2    Chen, X.3    Wong, D.S.4    Xhafa, F.5
  • 11
    • 84906247213 scopus 로고    scopus 로고
    • Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates
    • Liu, C., Chen, J., Yang, T., Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates. IEEE Trans. Parallel Distrib. Syst. 25:9 (2014), 2234–2244.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.9 , pp. 2234-2244
    • Liu, C.1    Chen, J.2    Yang, T.3
  • 13
    • 84862907810 scopus 로고    scopus 로고
    • Security challenges for the public cloud
    • Ren, K., Wang, C., Wang, Q., Security challenges for the public cloud. IEEE Internet Comput. 16:1 (2012), 69–73.
    • (2012) IEEE Internet Comput. , vol.16 , Issue.1 , pp. 69-73
    • Ren, K.1    Wang, C.2    Wang, Q.3
  • 14
    • 84928106743 scopus 로고    scopus 로고
    • Mutual verifiable provable data auditing in public cloud storage
    • 1
    • Ren, Y., Shen, J., Wang, J., Han, J., Lee, S., Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16:2 (2015), 317–323 1.
    • (2015) J. Internet Technol. , vol.16 , Issue.2 , pp. 317-323
    • Ren, Y.1    Shen, J.2    Wang, J.3    Han, J.4    Lee, S.5
  • 15
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • In: Springer-Verlag
    • Shacham, H., Waters, B., 2008. Compact proofs of retrievability. In: Proceedings of the ASIACRYPT 2008. Springer-Verlag, pp. 90–107.
    • (2008) Proceedings of the ASIACRYPT 2008 , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 16
    • 85002614804 scopus 로고    scopus 로고
    • A public cloud storage auditing scheme for resource-constrained clients
    • Shen, W., Yu, J., Hao, R., Wang, X., A public cloud storage auditing scheme for resource-constrained clients. High Perform. Syst. Archit. 6:3 (2016), 121–130.
    • (2016) High Perform. Syst. Archit. , vol.6 , Issue.3 , pp. 121-130
    • Shen, W.1    Yu, J.2    Hao, R.3    Wang, X.4
  • 18
    • 84861959172 scopus 로고    scopus 로고
    • Privacy preserving public auditing for secure cloud storage
    • Wang, C., Chow, S., Wang, Q., Ren, K., Lou, W., Privacy preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62:2 (2013), 362–375.
    • (2013) IEEE Trans. Comput. , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 19
    • 84963976001 scopus 로고    scopus 로고
    • Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud
    • Wang, H., He, D., Tang, S., Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Trans. Inf. Forensics Secur. 11:6 (2016), 1165–1176.
    • (2016) IEEE Trans. Inf. Forensics Secur. , vol.11 , Issue.6 , pp. 1165-1176
    • Wang, H.1    He, D.2    Tang, S.3
  • 20
    • 79953294892 scopus 로고    scopus 로고
    • Enabling public auditability and data dynamics for storage security in cloud computing
    • Wang, Q., Wang, C., Ren, K., Lou, W., Li, J., Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22:5 (2011), 847–859.
    • (2011) IEEE Trans. Parallel Distrib. Syst. , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Ren, K.3    Lou, W.4    Li, J.5
  • 21
    • 84883057189 scopus 로고    scopus 로고
    • Public auditing for shared data with efficient user revocation in the cloud
    • Wang, B., Li, B., Li, H., 2013a. Public auditing for shared data with efficient user revocation in the cloud. In: Proceedings of the IEEE INFOCOM 2013. vol. 8, no. 1, pp. 2904–2912.
    • (2013) Proceedings of the IEEE INFOCOM 2013 , vol.8 , Issue.1 , pp. 2904-2912
    • Wang, B.1    Li, B.2    Li, H.3
  • 23
    • 84866761388 scopus 로고    scopus 로고
    • Oruta: privacy-preserving public auditing for shared data in the cloud
    • In: June 24–29, 2012
    • Wang, B., Li, B., Li, H., 2012. Oruta: privacy-preserving public auditing for shared data in the cloud. In: Proceedings of the IEEE Cloud 2012. June 24–29, 2012, pp. 295–302.
    • (2012) Proceedings of the IEEE Cloud 2012 , pp. 295-302
    • Wang, B.1    Li, B.2    Li, H.3
  • 24
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • In: 2010
    • Wang, C., Wang, Q., Ren, K., Lou, W., 2010. Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of the IEEE INFOCOM 2010. pp. 525–533.
    • (2010) Proceedings of the IEEE INFOCO , pp. 525-533
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 25
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing
    • In: 2009
    • Wang, Q., Wang, C., Li, J., Ren, K., Lou, W., 2009. Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of the ESORICS 2009. pp. 355–370.
    • (2009) Proceedings of the ESORIC , pp. 355-370
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 26
    • 84902317194 scopus 로고    scopus 로고
    • Secure and efficient privacy-preserving public auditing scheme for cloud storage
    • Worku, S.G., Xu, C., Zhao, J., He, X., Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput. Electr. Eng. 40:5 (2014), 1703–1713.
    • (2014) Comput. Electr. Eng. , vol.40 , Issue.5 , pp. 1703-1713
    • Worku, S.G.1    Xu, C.2    Zhao, J.3    He, X.4
  • 27
    • 84962382590 scopus 로고    scopus 로고
    • Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability
    • Yang, G., Yu, J., Shen, W., Su, Q., Zhang, F., Hao, R., Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J. Syst. Softw. 113 (2016), 130–139.
    • (2016) J. Syst. Softw. , vol.113 , pp. 130-139
    • Yang, G.1    Yu, J.2    Shen, W.3    Su, Q.4    Zhang, F.5    Hao, R.6
  • 28
    • 84963837768 scopus 로고    scopus 로고
    • Enabling cloud storage auditing with verifiable outsourcing of key updates
    • Yu, J., Ren, K., Wang, C., Enabling cloud storage auditing with verifiable outsourcing of key updates. IEEE Trans. Inf. Forensics Secur. 11:5 (2016), 1362–1375.
    • (2016) IEEE Trans. Inf. Forensics Secur. , vol.11 , Issue.5 , pp. 1362-1375
    • Yu, J.1    Ren, K.2    Wang, C.3
  • 29
    • 84928139575 scopus 로고    scopus 로고
    • Enabling cloud storage auditing with key-exposure resistance
    • Yu, J., Ren, K., Wang, C., Varadharajan, V., Enabling cloud storage auditing with key-exposure resistance. IEEE Trans. Inf. Forensics Secur. 10:6 (2015), 1167–1179.
    • (2015) IEEE Trans. Inf. Forensics Secur. , vol.10 , Issue.6 , pp. 1167-1179
    • Yu, J.1    Ren, K.2    Wang, C.3    Varadharajan, V.4
  • 30
    • 84949654521 scopus 로고    scopus 로고
    • IRIBE: intrusion-resilient identity-based encryption
    • Yu, J., Hao, R., Zhao, H., Shu, M., Fan, J., IRIBE: intrusion-resilient identity-based encryption. Inf. Sci. 329 (2016), 90–104.
    • (2016) Inf. Sci. , vol.329 , pp. 90-104
    • Yu, J.1    Hao, R.2    Zhao, H.3    Shu, M.4    Fan, J.5
  • 31
    • 84904430603 scopus 로고    scopus 로고
    • Efficient public integrity checking for cloud data sharing with multi-user modification
    • In: April 27–May 2, 2014
    • Yuan, J., Yu, S., 2014. Efficient public integrity checking for cloud data sharing with multi-user modification. In: Proceedings of the IEEE INFOCOM 2014. April 27–May 2, 2014, pp. 2121–2129.
    • (2014) Proceedings of the IEEE INFOCOM 2014 , pp. 2121-2129
    • Yuan, J.1    Yu, S.2
  • 32
    • 79959325063 scopus 로고    scopus 로고
    • Dynamic audit services for integrity verification of outsourced storage in clouds
    • In: 2011
    • Zhu, Y., Wang, H., Hu, Z., Ahn, G.-J., Hu, H., Yau, S.S., 2011. Dynamic audit services for integrity verification of outsourced storage in clouds. In: Proceedings of the ACM SAC 2011. pp. 1550–1557.
    • (2011) Proceedings of the ACM SA , pp. 1550-1557
    • Zhu, Y.1    Wang, H.2    Hu, Z.3    Ahn, G.-J.4    Hu, H.5    Yau, S.S.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.