메뉴 건너뛰기




Volumn , Issue , 2019, Pages 355-368

Enabling security in cloud storage SLAs with CloudProof

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD STORAGE SYSTEMS; LARGE ENTERPRISE; MEMBERSHIP MANAGEMENT; PROPRIETARY SOFTWARE; SECURE STORAGE SYSTEMS; SECURITY MECHANISM; SECURITY SUPPORT; SERVICE LEVEL AGREEMENT (SLAS);

EID: 85032616916     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (130)

References (32)
  • 4
    • 0027764777 scopus 로고
    • A cryptographic file system for unix
    • BLAZE, M. A cryptographic file system for unix. In ACM CCS (1993).
    • (1993) ACM CCS
    • Blaze, M.1
  • 5
    • 24944498581 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • BONEH, D., GENTRY, C., AND WATERS, B. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. Lecture Notes in Computer Science (2005).
    • (2005) Lecture Notes in Computer Science
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 6
    • 74049144464 scopus 로고    scopus 로고
    • HAIL: A high-availability and integrity layer for cloud storage
    • BOWERS, K. D., JUELS, A., AND OPREA, A. HAIL: A High-Availability and Integrity Layer for Cloud Storage. CCS (2009).
    • (2009) CCS
    • Bowers, K.D.1    Juels, A.2    Oprea, A.3
  • 7
    • 41149141331 scopus 로고    scopus 로고
    • Practical byzantine fault tolerance and proactive recovery
    • CASTRO, M., AND LISKOV, B. Practical byzantine fault tolerance and proactive recovery. ACM TOCS (2002).
    • (2002) ACM TOCS
    • Castro, M.1    Liskov, B.2
  • 8
    • 85080490043 scopus 로고    scopus 로고
    • Attested append-only memory: Making adversaries stick to their word
    • CHUN, B.-G., MANIATIS, P., SHENKER, S., AND KUBIATOWICZ, J. Attested Append-Only Memory: Making Adversaries Stick to their Word. SOSP (2009).
    • (2009) SOSP
    • Chun, B.-G.1    Maniatis, P.2    Shenker, S.3    Kubiatowicz, J.4
  • 9
    • 78650345904 scopus 로고    scopus 로고
    • Proofs of retrievability via hardness amplification
    • DODIS, Y., VADHAN, S., AND WICHS, D. Proofs of Retrievability via Hardness Amplification. TCC (2009).
    • (2009) TCC
    • Dodis, Y.1    Vadhan, S.2    Wichs, D.3
  • 10
    • 85033498470 scopus 로고    scopus 로고
    • Sirius: Securing remote unstrusted storage
    • E.-J. GOH, H. SHACHAM, N. M., AND BONEH, D. Sirius: Securing remote unstrusted storage. In NDSS (2003).
    • (2003) NDSS
    • Goh, E.-J.1    Shacham, H.2    Boneh, D.3
  • 11
    • 84929577463 scopus 로고    scopus 로고
    • FE R D OW S I, A. S3 data corruption?, 2008. http://developer.amazonwebservices.com/connect/ thread.jspa?threadID=22709&start=0&tstart=0.
    • (2008) S3 Data Corruption?
    • Fe, R.D.1    Ow, S.I.2
  • 15
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • GOLDREICH, O., AND OSTROVSKY, R. Software protection and simulation on oblivious RAMs. J. ACM (1996).
    • (1996) J. ACM
    • Goldreich, O.1    Ostrovsky, R.2
  • 17
    • 74049103479 scopus 로고    scopus 로고
    • Pors: Proofs of retrievability for large files
    • JUELS, A., AND KALISKI, B. PORs: Proofs of retrievability for large files. In ACM CCS (2007).
    • (2007) ACM CCS
    • Juels, A.1    Kaliski, B.2
  • 20
    • 26444479283 scopus 로고    scopus 로고
    • SuNDR: Secure untrusted data repository
    • LI, J., KROHN, M., MAZIERES, D., AND SHASHA, D. SUNDR: Secure untrusted data repository. In OSDI (2004).
    • (2004) OSDI
    • Li, J.1    Krohn, M.2    Mazieres, D.3    Shasha, D.4
  • 22
    • 84864720397 scopus 로고    scopus 로고
    • MICROSOFT CORPORATION. Windows Azure. http://www.microsoft.com/windowsazure.
    • Windows Azure
  • 24
    • 85080586231 scopus 로고    scopus 로고
    • Design and implementation of verifiable audit trails for a versioning file system
    • PETERSON, Z. N. J., BURNS, R., AND ATENIESE, G. Design and Implementation of Verifiable Audit Trails for a Versioning File System. USENIX FAST (2007).
    • (2007) USENIX FAST
    • Peterson, Z.N.J.1    Burns, R.2    Ateniese, G.3
  • 25
    • 74049095755 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • SACHAM, H., AND WATERS, B. Compact Proofs of Retrievability. ASIACRYPT (2008).
    • (2008) ASIACRYPT
    • Sacham, H.1    Waters, B.2
  • 26
    • 85084161255 scopus 로고    scopus 로고
    • Cryptographic support for secure logs on untrusted machines
    • SCHNEIER, B., AND KERSEY, J. Cryptographic Support for Secure Logs on Untrusted Machines. USENIX Security (1998).
    • (1998) USENIX Security
    • Schneier, B.1    Kersey, J.2
  • 27
    • 85141026002 scopus 로고    scopus 로고
    • On the computational practicality of private information retrieval
    • SION, R., AND CARBUNAR, B. On the computational practicality of private information retrieval. In NDSS (2007).
    • (2007) NDSS
    • Sion, R.1    Carbunar, B.2
  • 29
    • 85016014408 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing
    • WANG, Q., WANG, C., LI, J., REN, K., AND LOU, W. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. ESORICS (2009).
    • (2009) ESORICS
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 32
    • 85080567905 scopus 로고    scopus 로고
    • WINDOWS AZURE PLATFORM. Azure SDK, 2009. http://msdn.microsoft.com/en-us/library/dd179367.aspx.
    • (2009) Azure SDK


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.