메뉴 건너뛰기




Volumn 10, Issue 4, 2017, Pages 520-533

Efficient and Scalable Query Authentication for Cloud-Based Storage Systems with Multiple Data Sources

Author keywords

aggregate authentication tags; Cloud based storage systems; discrete log; multi trapdoor hash functions; query authentication

Indexed keywords

AGGREGATES; AUTHENTICATION; DIGITAL STORAGE; FUNCTION EVALUATION; HASH FUNCTIONS;

EID: 85029366507     PISSN: 19391374     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSC.2015.2500568     Document Type: Article
Times cited : (21)

References (55)
  • 3
    • 85029378109 scopus 로고    scopus 로고
    • A European Report on Servers & Storage for Small Business, Feb.
    • Dell and Intel, "Manage your changing IT needs," A European Report on Servers & Storage for Small Business, Feb. 2012.
    • (2012) Manage Your Changing IT Needs
  • 4
    • 84871583519 scopus 로고    scopus 로고
    • Findings of Microsoft SMB Business in the Cloud 2012 research report conducted in conjunction with Edge Strategies Inc., Feb.
    • Microsoft, "Drivers & inhibitors to cloud adoption for small and midsize businesses," Findings of Microsoft SMB Business in the Cloud 2012 research report conducted in conjunction with Edge Strategies Inc., Feb. 2012.
    • (2012) Drivers & Inhibitors to Cloud Adoption for Small and Midsize Businesses
  • 11
    • 85084160707 scopus 로고    scopus 로고
    • Disk failures in the real world: What does an MTTF of 1,000,000 hours mean to you?
    • Feb. 13-16, San Jose, CA, USA
    • B. Schroeder and G. A. Gibson, "Disk failures in the real world: What does an MTTF of 1,000,000 hours mean to you?" in Proc. 5th USENIX Conf. File Storage Technol., Feb. 13-16, San Jose, CA, USA, 2007, pp. 1-16.
    • (2007) Proc. 5th USENIX Conf. File Storage Technol. , pp. 1-16
    • Schroeder, B.1    Gibson, G.A.2
  • 12
    • 33747176236 scopus 로고    scopus 로고
    • Authentication and integrity in outsourced databases
    • E. Mykletun, M. Narasimha, and G. Tsudik, "Authentication and integrity in outsourced databases," ACM Trans. Storage, vol. 2, no. 2, pp. 107-138, 2006.
    • (2006) ACM Trans. Storage , vol.2 , Issue.2 , pp. 107-138
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 13
    • 84869744058 scopus 로고    scopus 로고
    • Efficient query integrity for outsourced dynamic databases
    • Raleigh, NC, USA, Oct. 19
    • Q. Zheng, S. Xu, and G. Ateniese, "Efficient query integrity for outsourced dynamic databases," in Proc. ACM Workshop Cloud Comput. Security, Raleigh, NC, USA, Oct. 19, 2012, pp. 71-82.
    • (2012) Proc. ACM Workshop Cloud Comput. Security , pp. 71-82
    • Zheng, Q.1    Xu, S.2    Ateniese, G.3
  • 16
    • 84881080693 scopus 로고    scopus 로고
    • An efficient and secure dynamic auditing protocol for data storage in cloud computing
    • Sep.
    • K. Yang and X. Jia, "An efficient and secure dynamic auditing protocol for data storage in cloud computing," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 9, pp. 1717-1726, Sep. 2013.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.9 , pp. 1717-1726
    • Yang, K.1    Jia, X.2
  • 17
    • 84904430603 scopus 로고    scopus 로고
    • Efficient public integrity checking for cloud data sharing with multi-user modification
    • Toronto, ON, Canada, Apr. 27-May 2
    • J. Yuan and S. Yu, "Efficient public integrity checking for cloud data sharing with Multi-user modification," in Proc. IEEE Conf. Comput. Commun., Toronto, ON, Canada, Apr. 27-May 2, 2014, pp. 2121-2129.
    • (2014) Proc. IEEE Conf. Comput. Commun. , pp. 2121-2129
    • Yuan, J.1    Yu, S.2
  • 19
    • 79953294892 scopus 로고    scopus 로고
    • Enabling public auditability and data dynamics for storage security in cloud computing
    • May
    • Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling public auditability and data dynamics for storage security in cloud computing," IEEE Trans. Parallel Distrib. Syst. vol. 22, no. 5, pp. 847-859, May 2011.
    • (2011) IEEE Trans. Parallel Distrib. Syst. , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Ren, K.3    Lou, W.4    Li, J.5
  • 20
    • 84861959172 scopus 로고    scopus 로고
    • Privacypreserving public auditing for secure cloud storage
    • Feb.
    • C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, "Privacypreserving public auditing for secure cloud storage," IEEE Trans. Comput., vol. 62, no. 2, pp. 362-375, Feb. 2013.
    • (2013) IEEE Trans. Comput. , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.S.M.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 21
    • 84863472230 scopus 로고    scopus 로고
    • Knox: Privacy-preserving auditing for shared data with large groups in the cloud
    • Singapore, Jun. 26-29
    • B. Wang, B. Li, and H. Li, "Knox: Privacy-preserving auditing for shared data with large groups in the cloud," in Proc. 10th Int. Conf. Appl. Cryptography Netw. Security, Singapore, Jun. 26-29, 2012, pp. 507-525.
    • (2012) Proc. 10th Int. Conf. Appl. Cryptography Netw. Security , pp. 507-525
    • Wang, B.1    Li, B.2    Li, H.3
  • 22
    • 84942034654 scopus 로고    scopus 로고
    • Efficient public verification on the integrity of multi-owner data in the cloud
    • B. Wang, H. Li, X. Liu, F. Li, and X. Li, "Efficient public verification on the integrity of multi-owner data in the cloud," J. Commun. Netw., vol. 16, no. 6, pp. 592-599, 2014.
    • (2014) J. Commun. Netw. , vol.16 , Issue.6 , pp. 592-599
    • Wang, B.1    Li, H.2    Liu, X.3    Li, F.4    Li, X.5
  • 23
    • 84922271700 scopus 로고    scopus 로고
    • Oruta: Privacy-preserving public auditing for shared data in the cloud
    • Jan.-Mar.
    • B. Wang, B. Li, and H. Li, "Oruta: Privacy-preserving public auditing for shared data in the cloud," IEEE Trans. Cloud Comput., vol. 2, no. 1, pp. 43-56, Jan.-Mar. 2014.
    • (2014) IEEE Trans. Cloud Comput. , vol.2 , Issue.1 , pp. 43-56
    • Wang, B.1    Li, B.2    Li, H.3
  • 24
    • 84922828826 scopus 로고    scopus 로고
    • Panda: Public auditing for shared data with efficient user revocation in the cloud
    • Jan./Feb.
    • B. Wang, B. Li, and H. Li, "Panda: Public auditing for shared data with efficient user revocation in the cloud," IEEE Trans. Services Comput., vol. 8, no. 1, pp. 92-106, Jan./Feb. 2015.
    • (2015) IEEE Trans. Services Comput. , vol.8 , Issue.1 , pp. 92-106
    • Wang, B.1    Li, B.2    Li, H.3
  • 25
    • 33745528450 scopus 로고    scopus 로고
    • Authentication of outsourced databases using signature aggregation and chaining
    • Singapore, Apr. 12-15
    • M. Narasimha and G. Tsudik, "Authentication of outsourced databases using signature aggregation and chaining," in Proc. 11th Int. Conf. Database Syst. Adv. Appl., Singapore, Apr. 12-15, 2006, pp. 420-436.
    • (2006) Proc. 11th Int. Conf. Database Syst. Adv. Appl. , pp. 420-436
    • Narasimha, M.1    Tsudik, G.2
  • 26
    • 77952757644 scopus 로고    scopus 로고
    • Scalable verification for outsourced dynamic databases
    • H. Pang, J. Zhang, and K. Mouratidis, "Scalable verification for outsourced dynamic databases," Proc. VLDB Endowment, vol. 2, no. 1, pp. 802-813, 2009.
    • (2009) Proc. VLDB Endowment , vol.2 , Issue.1 , pp. 802-813
    • Pang, H.1    Zhang, J.2    Mouratidis, K.3
  • 27
    • 84921446185 scopus 로고    scopus 로고
    • Multi-trapdoor hash functions and their applications in network security
    • San Francisco, CA, USA, Oct. 29-31
    • S. Chandrasekhar and M. Singhal, "Multi-trapdoor hash functions and their applications in network security," in Proc. IEEE 2nd Conf. Commun. Netw. Security, San Francisco, CA, USA, Oct. 29-31, 2014, pp. 472-480.
    • (2014) Proc. IEEE 2nd Conf. Commun. Netw. Security , pp. 472-480
    • Chandrasekhar, S.1    Singhal, M.2
  • 29
    • 49849102704 scopus 로고    scopus 로고
    • Efficient generic on-line/off-line (threshold) signatures without key exposure
    • X. Chen, F. Zhang, H. Tian, B. Wei, W. Susilo, Y. Mu, H. Lee, and K. Kim, "Efficient generic on-line/off-line (threshold) signatures without key exposure," Inf. Sci., vol. 178, no. 21, pp. 4192-4203, 2008.
    • (2008) Inf. Sci. , vol.178 , Issue.21 , pp. 4192-4203
    • Chen, X.1    Zhang, F.2    Tian, H.3    Wei, B.4    Susilo, W.5    Mu, Y.6    Lee, H.7    Kim, K.8
  • 32
    • 72349083152 scopus 로고    scopus 로고
    • Skip list based authenticated data structure in das paradigm
    • Lanzhou, Gansu, China, Aug. 27-29
    • J. Wang and X. Du, "Skip list based authenticated data structure in DAS paradigm," in Proc. 8th Int. Conf. Grid Cooperative Comput., Lanzhou, Gansu, China, Aug. 27-29, 2009, pp. 69-75.
    • (2009) Proc. 8th Int. Conf. Grid Cooperative Comput. , pp. 69-75
    • Wang, J.1    Du, X.2
  • 34
    • 84890471117 scopus 로고    scopus 로고
    • Proxy provable data possession in public clouds
    • Oct.-Dec.
    • H. Wang, "Proxy provable data possession in public clouds," IEEE Trans. Services Comput., vol. 6, no. 4, pp. 551-559, Oct.-Dec. 2013.
    • (2013) IEEE Trans. Services Comput. , vol.6 , Issue.4 , pp. 551-559
    • Wang, H.1
  • 35
    • 74049103479 scopus 로고    scopus 로고
    • Pors: Proofs of retrievability for large files
    • B. S. K. Jr, Alexandria, VA, USA, Oct. 28-31
    • A. Juels and B. S. K. Jr, "Pors: Proofs of retrievability for large files," in Proc. 14th ACM Conf. Comput. Commun. Security, Alexandria, VA, USA, Oct. 28-31, 2007, pp. 584-597.
    • (2007) Proc. 14th ACM Conf. Comput. Commun. Security , pp. 584-597
    • Juels, A.1
  • 38
    • 47849089563 scopus 로고    scopus 로고
    • Demonstrating data possession and uncheatable data transfer
    • D. L. G. Filho and P. S. L. M. Barreto, "Demonstrating data possession and uncheatable data transfer," IACR Cryptol. ePrint Archive, vol. 2006, p. 150, 2006.
    • (2006) IACR Cryptol. EPrint Archive , vol.2006 , pp. 150
    • Filho, D.L.G.1    Barreto, P.S.L.M.2
  • 41
    • 33244454312 scopus 로고    scopus 로고
    • Securing distributed storage: Challenges, techniques, and systems
    • Fairfax, VA, USA, Nov. 11
    • V. Kher and Y. Kim, "Securing distributed storage: Challenges, techniques, and systems," in Proc. 1st Int. Workshop Storage Security Survivability, Fairfax, VA, USA, Nov. 11, 2005, pp. 9-25.
    • (2005) Proc. 1st Int. Workshop Storage Security Survivability , pp. 9-25
    • Kher, V.1    Kim, Y.2
  • 43
    • 84945126272 scopus 로고    scopus 로고
    • Auditing for data integrity and reliability in cloud storage
    • New York, NY, USA: Springer
    • B. Liu and Y. Chen, "Auditing for data integrity and reliability in cloud storage," in Handbook on Data Centers. New York, NY, USA: Springer, 2015, pp. 535-559.
    • (2015) Handbook on Data Centers , pp. 535-559
    • Liu, B.1    Chen, Y.2
  • 45
    • 84901607854 scopus 로고    scopus 로고
    • A review on remote data auditing in single cloud server: Taxonomy and open issues
    • M. Sookhak, H. Talebian, E. Ahmed, A. Gani, and M. K. Khan, "A review on remote data auditing in single cloud server: Taxonomy and open issues," J. Netw. Comput. Appl., vol. 43, pp. 121-141, 2014.
    • (2014) J. Netw. Comput. Appl. , vol.43 , pp. 121-141
    • Sookhak, M.1    Talebian, H.2    Ahmed, E.3    Gani, A.4    Khan, M.K.5
  • 47
    • 84878830854 scopus 로고    scopus 로고
    • Dynamic audit services for outsourced storages in clouds
    • Apr.-Jun.
    • Y. Zhu, G. Ahn, H. Hu, S. S. Yau, H. G. An, and C. Hu, "Dynamic audit services for outsourced storages in clouds," IEEE Trans. Services Comput., vol. 6, no. 2, pp. 227-238, Apr.-Jun. 2013.
    • (2013) IEEE Trans. Services Comput. , vol.6 , Issue.2 , pp. 227-238
    • Zhu, Y.1    Ahn, G.2    Hu, H.3    Yau, S.S.4    An, H.G.5    Hu, C.6
  • 51
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C.-P. Schnorr, "Efficient signature generation by smart cards," J. Cryptol., vol. 4, no. 3, pp. 161-174, 1991.
    • (1991) J. Cryptol. , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.-P.1
  • 52
    • 0028762624 scopus 로고
    • New digital signature scheme based on discrete logarithm
    • Mar.
    • L. Harn, "New digital signature scheme based on discrete logarithm," Electron. Lett., vol. 30, no. 5, pp. 396-398, Mar. 1994.
    • (1994) Electron. Lett. , vol.30 , Issue.5 , pp. 396-398
    • Harn, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.