메뉴 건너뛰기




Volumn 28, Issue 5, 2017, Pages 1457-1469

Securing coding-based cloud storage against pollution attacks

Author keywords

Cloud storage; coding; integrity; performance; pollution attack; security

Indexed keywords

CODES (SYMBOLS); DIGITAL STORAGE; POLLUTION; REDUNDANCY; SECURITY OF DATA;

EID: 85018191767     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2016.2619686     Document Type: Article
Times cited : (17)

References (25)
  • 2
    • 84927589445 scopus 로고    scopus 로고
    • Exploiting rateless codes in cloud storage systems
    • May
    • C. Anglano, R. Gaeta, and M. Grangetto, "Exploiting rateless codes in cloud storage systems," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 5, pp. 1313-1322, May 2015
    • (2015) IEEE Trans. Parallel Distrib. Syst , vol.26 , Issue.5 , pp. 1313-1322
    • Anglano, C.1    Gaeta, R.2    Grangetto, M.3
  • 3
    • 80052878696 scopus 로고    scopus 로고
    • Detection, and recovery from pollution attacks in coding-based distributed storage schemes
    • Nov./Dec
    • L. Buttyan, L. Czap, and I. Vajda, "Detection, and recovery from pollution attacks in coding-based distributed storage schemes," IEEE Trans. Depend. Secure Comput., vol. 8, no. 6, pp. 824-838, Nov./Dec. 2011
    • (2011) IEEE Trans. Depend. Secure Comput , vol.8 , Issue.6 , pp. 824-838
    • Buttyan, L.1    Czap, L.2    Vajda, I.3
  • 4
    • 84861630520 scopus 로고    scopus 로고
    • LT codes-based secure, and reliable cloud storage service
    • N. Cao, S. Yu, Z. Yang, W. Lou, and Y. Hou, "LT codes-based secure, and reliable cloud storage service," in Proc. IEEE INFOCOM, 2012, pp. 693-701
    • (2012) Proc. IEEE Infocom , pp. 693-701
    • Cao, N.1    Yu, S.2    Yang, Z.3    Lou, W.4    Hou, Y.5
  • 6
    • 3543050732 scopus 로고    scopus 로고
    • On-the-fly verification of rateless erasure codes for efficient content distribution
    • M. N. Krohn, M. J. Freedman, and D. Mazieres, "On-the-fly verification of rateless erasure codes for efficient content distribution," in Proc. IEEE Symp. Secur. Privacy, 2004, pp. 226-240
    • (2004) Proc. IEEE Symp. Secur. Privacy , pp. 226-240
    • Krohn, M.N.1    Freedman, M.J.2    Mazieres, D.3
  • 8
    • 51349130622 scopus 로고    scopus 로고
    • An efficient signaturebased scheme for securing network coding against pollution attacks
    • Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient signaturebased scheme for securing network coding against pollution attacks," in Proc. 27th Conf. Comput. Commun., 2008, pp. 2083-2091
    • (2008) Proc. 27th Conf. Comput. Commun , pp. 2083-2091
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4
  • 9
    • 70349653419 scopus 로고    scopus 로고
    • Null keys: Limiting malicious attacks via null space properties of network coding
    • E. Kehdi, and B. Li, "Null keys: Limiting malicious attacks via null space properties of network coding," in Proc. IEEE INFOCOM, 2009, pp. 1224-1232
    • (2009) Proc. IEEE INFOCOM , pp. 1224-1232
    • Kehdi, E.1    Li, B.2
  • 10
    • 70349664122 scopus 로고    scopus 로고
    • An efficient scheme for securing XOR network coding against pollution attacks
    • Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient scheme for securing XOR network coding against pollution attacks," in Proc. IEEE INFOCOM, 2009, pp. 406-414
    • (2009) Proc. IEEE INFOCOM , pp. 406-414
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4
  • 11
    • 84923202070 scopus 로고    scopus 로고
    • A tag encoding scheme against pollution attack to linear network coding
    • Jan
    • X. Wu, Y. Xu, C. Yuen, and L. Xiang, "A tag encoding scheme against pollution attack to linear network coding," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 33-42, Jan. 2014
    • (2014) IEEE Trans. Parallel Distrib. Syst , vol.25 , Issue.1 , pp. 33-42
    • Wu, X.1    Xu, Y.2    Yuen, C.3    Xiang, L.4
  • 12
    • 84904431009 scopus 로고    scopus 로고
    • Secure cloud storage meets with secure network coding
    • F. Chen, T. Xiang, Y. Yang, and S. Chow, "Secure cloud storage meets with secure network coding," in Proc. IEEE INFOCOM, 2014, pp. 673-681
    • (2014) Proc. IEEE INFOCOM , pp. 673-681
    • Chen, F.1    Xiang, T.2    Yang, Y.3    Chow, S.4
  • 13
    • 84866669823 scopus 로고    scopus 로고
    • Nc-Audit: Auditing for network coding storage
    • A. Le, and A. Markopoulou, "Nc-Audit: Auditing for network coding storage," in Proc. Int. Symp. Netw. Coding, 2012, pp. 155-160
    • (2012) Proc. Int. Symp. Netw. Coding , pp. 155-160
    • Le, A.1    Markopoulou, A.2
  • 14
    • 85027916843 scopus 로고    scopus 로고
    • An effective integrity check scheme for secure erasure code-based storage systems
    • Sep
    • S. T. Shen, H. Y. Lin, and W. G. Tzeng, "An effective integrity check scheme for secure erasure code-based storage systems," IEEE Trans. Rel., vol. 64, no. 3, pp. 840-851, Sep. 2015
    • (2015) IEEE Trans. Rel , vol.64 , Issue.3 , pp. 840-851
    • Shen, S.T.1    Lin, H.Y.2    Tzeng, W.G.3
  • 15
    • 45249114824 scopus 로고    scopus 로고
    • Byzantine modification detection in multicast networks with random network coding
    • Jun
    • T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros, and D. Karger, "Byzantine modification detection in multicast networks with random network coding," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2798-2803, Jun. 2008
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2798-2803
    • Ho, T.1    Leong, B.2    Koetter, R.3    Medard, M.4    Effros, M.5    Karger, D.6
  • 16
    • 45249101743 scopus 로고    scopus 로고
    • Resilient network coding in the presence of Byzantine adversaries
    • Jun
    • S. Jaggi, et al., "Resilient network coding in the presence of Byzantine adversaries," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2596-2603, Jun. 2008
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2596-2603
    • Jaggi, S.1
  • 17
    • 48849089497 scopus 로고    scopus 로고
    • Coding for errors, and erasures in random network coding
    • Aug
    • R. Koetter, and F. Kschischang, "Coding for errors, and erasures in random network coding," IEEE Trans. Inf. Theory, vol. 54, no. 8, pp. 3579-3591, Aug. 2008
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.8 , pp. 3579-3591
    • Koetter, R.1    Kschischang, F.2
  • 20
    • 73449141839 scopus 로고    scopus 로고
    • On the fly Gaussian elimination for LT codes
    • Dec
    • V. Bioglio, R. Gaeta, M. Grangetto, and M. Sereno, "On the fly Gaussian elimination for LT codes," IEEE Commun. Lett., vol. 13, no. 12, pp. 953-955, Dec. 2009
    • (2009) IEEE Commun. Lett , vol.13 , Issue.12 , pp. 953-955
    • Bioglio, V.1    Gaeta, R.2    Grangetto, M.3    Sereno, M.4
  • 22
    • 84883400280 scopus 로고    scopus 로고
    • Identification of malicious nodes in peer-to-peer streaming: A belief propagation based technique
    • Oct
    • R. Gaeta, and M. Grangetto, "Identification of malicious nodes in peer-to-peer streaming: A belief propagation based technique," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 10, pp. 1994-2003, Oct. 2013
    • (2013) IEEE Trans. Parallel Distrib. Syst , vol.24 , Issue.10 , pp. 1994-2003
    • Gaeta, R.1    Grangetto, M.2
  • 24
    • 77249133687 scopus 로고    scopus 로고
    • Measurement-based analysis, modeling, and synthesis of the Internet delay space
    • Feb
    • B. Zhang, T. S. E. Ng, A. Nandi, R. H. Riedi, P. Druschel, and G. Wang, "Measurement-based analysis, modeling, and synthesis of the Internet delay space," IEEE/ACM Trans. Netw., vol. 18, no. 1, pp. 229-242, Feb. 2010
    • (2010) IEEE/ACM Trans. Netw , vol.18 , Issue.1 , pp. 229-242
    • Zhang, B.1    Ng, T.S.E.2    Nandi, A.3    Riedi, R.H.4    Druschel, P.5    Wang, G.6
  • 25
    • 84893388109 scopus 로고    scopus 로고
    • Band codes for energy-efficient network coding with application to P2P mobile streaming
    • Feb
    • A. Fiandrotti, V. Bioglio, M. Grangetto, R. Gaeta, and E. Magli, "Band codes for energy-efficient network coding with application to P2P mobile streaming," IEEE Trans. Multimedia, vol. 16, no. 2, pp. 521-532, Feb. 2014
    • (2014) IEEE Trans. Multimedia , vol.16 , Issue.2 , pp. 521-532
    • Fiandrotti, A.1    Bioglio, V.2    Grangetto, M.3    Gaeta, R.4    Magli, E.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.