메뉴 건너뛰기




Volumn 33, Issue 4, 2017, Pages 923-938

An enhanced cloud data storage auditing protocol providing strong security and efficiency for smart city

Author keywords

Cloud auditing protocol; Cloud computing; Pri ; Security; Storage verification; Vacy preserving

Indexed keywords

CLOUD COMPUTING; DATA PRIVACY; EFFICIENCY; OUTSOURCING; SMART CITY;

EID: 85049902514     PISSN: 10162364     EISSN: None     Source Type: Journal    
DOI: 10.6688/JISE.2017.33.4.4     Document Type: Article
Times cited : (10)

References (42)
  • 2
    • 84862907810 scopus 로고    scopus 로고
    • Security challenges for the public cloud
    • K. Ren, C. Wang, and Q. Wang, “Security challenges for the public cloud,” IEEE Internet Computing, Vol. 16, 2012, pp. 69-73.
    • (2012) IEEE Internet Computing , vol.16 , pp. 69-73
    • Ren, K.1    Wang, C.2    Wang, Q.3
  • 4
    • 85028448989 scopus 로고    scopus 로고
    • A secure identity-based dynamic group data sharing scheme for cloud computing
    • J. Shen, D. Liu, C. Lai, Y. Ren, and X. Sun, “A secure identity-based dynamic group data sharing scheme for cloud computing,” Journal of Internet Technology, Vol. 18, 2016, DOI: 10.6138/JIT.2017.18.4.20160415.
    • (2016) Journal of Internet Technology , vol.18
    • Shen, J.1    Liu, D.2    Lai, C.3    Ren, Y.4    Sun, X.5
  • 6
    • 85017189145 scopus 로고    scopus 로고
    • A secure cloud-assisted urban data sharing framework for ubiquitous-cities
    • J. Shen, D. Liu, J. Wang, J. Shen, Q. Liu, and X. Sun, “A secure cloud-assisted urban data sharing framework for ubiquitous-cities,” Pervasive and Mobile Computing, 2017, DOI: 10.1016/j.pmcj.2017.03.013.
    • (2017) Pervasive and Mobile Computing
    • Shen, J.1    Liu, D.2    Wang, J.3    Shen, J.4    Liu, Q.5    Sun, X.6
  • 7
    • 84929085499 scopus 로고    scopus 로고
    • State-of-the-art survey on cloud computing security challenges, approaches and solutions
    • F. Shahzad, “State-of-the-art survey on cloud computing security challenges, approaches and solutions,” Elsevier Procedia Computer Science, Vol. 37, 2014, pp. 357-362.
    • (2014) Elsevier Procedia Computer Science , vol.37 , pp. 357-362
    • Shahzad, F.1
  • 10
    • 84958124876 scopus 로고    scopus 로고
    • Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
    • Q. Jiang, F. Wei, S. Fu, J. Ma, G. Li, and A. Alelaiwi, “Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy,” Nonlinear Dynamics, Vol. 83, 2016, pp. 2085-2101.
    • (2016) Nonlinear Dynamics , vol.83 , pp. 2085-2101
    • Jiang, Q.1    Wei, F.2    Fu, S.3    Ma, J.4    Li, G.5    Alelaiwi, A.6
  • 11
    • 84872875967 scopus 로고    scopus 로고
    • Identity-based key agreement protocol employing a symmetric balanced incomplete block design
    • J. Shen, S. Moh, and I. Chung, “Identity-based key agreement protocol employing a symmetric balanced incomplete block design,” Journal of Communications and Networks, Vol. 14, 2012, pp. 682-691.
    • (2012) Journal of Communications and Networks , vol.14 , pp. 682-691
    • Shen, J.1    Moh, S.2    Chung, I.3
  • 12
    • 84935865949 scopus 로고    scopus 로고
    • A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
    • D. He, N. Kumar, and N. Chilamkurti, “A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks,” Information Sciences, Vol. 321, 2015, pp. 263-277.
    • (2015) Information Sciences , vol.321 , pp. 263-277
    • He, D.1    Kumar, N.2    Chilamkurti, N.3
  • 13
    • 84939576175 scopus 로고    scopus 로고
    • An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    • Q. Jiang, J. Ma, X. Lu, and Y. Tian, “An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks,” Peer-to-Peer Networking and Applications, Vol. 8, 2015, pp. 1070-1081.
    • (2015) Peer-to-Peer Networking and Applications , vol.8 , pp. 1070-1081
    • Jiang, Q.1    Ma, J.2    Lu, X.3    Tian, Y.4
  • 14
    • 84947804555 scopus 로고    scopus 로고
    • Enhanced secure sensor association and key management in wireless body area networks
    • J. Shen, S. Moh, and I. Chung, “Enhanced secure sensor association and key management in wireless body area networks,” Journal of Communications and Networks, Vol. 17, 2015, pp. 453-462.
    • (2015) Journal of Communications and Networks , vol.17 , pp. 453-462
    • Shen, J.1    Moh, S.2    Chung, I.3
  • 15
    • 84964246143 scopus 로고    scopus 로고
    • Anonymous authentication for wireless body area networks with provable security
    • D. He, S. Zeadally, N. Kumar, and J. Lee, “Anonymous authentication for wireless body area networks with provable security,” IEEE Systems Journal, 2016, DOI: 10. 1109/JSYST.2016.2544805.
    • (2016) IEEE Systems Journal
    • He, D.1    Zeadally, S.2    Kumar, N.3    Lee, J.4
  • 17
    • 84973560504 scopus 로고    scopus 로고
    • An efficient RFID authentication protocol providing strong privacy and security
    • J. Shen, H. Tan, S. Moh, I. Chung, and J. Wang, “An efficient rfid authentication protocol providing strong privacy and security,” Journal of Internet Technology, Vol. 17, 2016, pp. 443-455.
    • (2016) Journal of Internet Technology , vol.17 , pp. 443-455
    • Shen, J.1    Tan, H.2    Moh, S.3    Chung, I.4    Wang, J.5
  • 18
    • 84988227377 scopus 로고    scopus 로고
    • Improvement of robust smart-card-based password authentication scheme
    • Q. Jiang, J. Ma, G. Li, and X. Li, “Improvement of robust smart-card-based password authentication scheme,” International Journal of Communication Systems, Vol. 28, 2015, pp. 383-393.
    • (2015) International Journal of Communication Systems , vol.28 , pp. 383-393
    • Jiang, Q.1    Ma, J.2    Li, G.3    Li, X.4
  • 19
    • 84976428104 scopus 로고    scopus 로고
    • Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image data
    • S. Hu, Q. Wang, J. Wang, Z. Qin, and K. Ren, “Securing SIFT: privacy-preserving outsourcing computation of feature extractions over encrypted image data,” IEEE Transactions on Image Processing, Vol. 25, 2016, pp. 3411-3425.
    • (2016) IEEE Transactions on Image Processing , vol.25 , pp. 3411-3425
    • Hu, S.1    Wang, Q.2    Wang, J.3    Qin, Z.4    Ren, K.5
  • 21
    • 72449185582 scopus 로고    scopus 로고
    • Proofs of storage from homomorphic identification protocols
    • G. Ateniese, S. Kamara, and J. Katz, “Proofs of storage from homomorphic identification protocols,” Advances in Cryptology-ASIACRYPT, 2009, pp. 319-333.
    • (2009) Advances in Cryptology-ASIACRYPT , pp. 319-333
    • Ateniese, G.1    Kamara, S.2    Katz, J.3
  • 23
    • 84878998883 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • H. Shacham and B. Waters, “Compact proofs of retrievability,” Journal of Cryptology, Vol. 26, 2013, pp. 442-483.
    • (2013) Journal of Cryptology , vol.26 , pp. 442-483
    • Shacham, H.1    Waters, B.2
  • 24
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in Proceedings of IEEE INFOCOM, 2010, pp. 1-9.
    • (2010) Proceedings of IEEE INFOCOM , pp. 1-9
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 27
    • 77954843911 scopus 로고    scopus 로고
    • Toward publicly auditable secure cloud data storage services
    • C. Wang, K. Ren, W. Lou, and J. Li, “Toward publicly auditable secure cloud data storage services,” IEEE Network, Vol. 24, 2010, pp. 19-24.
    • (2010) IEEE Network , vol.24 , pp. 19-24
    • Wang, C.1    Ren, K.2    Lou, W.3    Li, J.4
  • 28
    • 84861959172 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for secure cloud storage
    • C. Wang, S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” IEEE Transactions on Computers, Vol. 62, 2013, pp. 362-375.
    • (2013) IEEE Transactions on Computers , vol.62 , pp. 362-375
    • Wang, C.1    Chow, S.M.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 29
  • 31
    • 84881080693 scopus 로고    scopus 로고
    • An efficient and secure dynamic auditing protocol for data storage in cloud computing
    • K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, Vol. 24, 2013, pp. 1717-1726.
    • (2013) IEEE Transactions on Parallel and Distributed Systems , vol.24 , pp. 1717-1726
    • Yang, K.1    Jia, X.2
  • 32
    • 84922271700 scopus 로고    scopus 로고
    • Oruta: Privacy-preserving public auditing for shared data in the cloud
    • B. Wang, B. Li, and H. Li, “Oruta: privacy-preserving public auditing for shared data in the cloud,” IEEE Transactions on Cloud Computing, Vol. 2, 2014, pp. 43-56.
    • (2014) IEEE Transactions on Cloud Computing , vol.2 , pp. 43-56
    • Wang, B.1    Li, B.2    Li, H.3
  • 33
    • 84942034654 scopus 로고    scopus 로고
    • Efficient public verification on the integrity of multi-owner data in the cloud
    • B. Wang, H. Li, X. Liu, F. Li, and X. Li, “Efficient public verification on the integrity of multi-owner data in the cloud,” Journal of Communications and Networks, Vol. 16, 2014, pp. 592-599.
    • (2014) Journal of Communications and Networks , vol.16 , pp. 592-599
    • Wang, B.1    Li, H.2    Liu, X.3    Li, F.4    Li, X.5
  • 35
    • 84922828826 scopus 로고    scopus 로고
    • Panda: Public auditing for shared data with efficient user revocation in the cloud
    • B. Wang, B. Li, and H. Li, “Panda: public auditing for shared data with efficient user revocation in the cloud,” IEEE Transactions on Services Computing, Vol. 8, 2015, pp. 92-106.
    • (2015) IEEE Transactions on Services Computing , vol.8 , pp. 92-106
    • Wang, B.1    Li, B.2    Li, H.3
  • 36
    • 84939179414 scopus 로고    scopus 로고
    • MuR-DPA: Top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud
    • C. Liu, R. Ranjan, C. Yang, X. Zhang, L. Wang, and J. Chen, “MuR-DPA: top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud,” IEEE Transactions on Computers, Vol. 64, 2015, pp. 2609-2622.
    • (2015) IEEE Transactions on Computers , vol.64 , pp. 2609-2622
    • Liu, C.1    Ranjan, R.2    Yang, C.3    Zhang, X.4    Wang, L.5    Chen, J.6
  • 38
    • 84933037073 scopus 로고    scopus 로고
    • OPoR: Enabling proof of retrievability in cloud computing with resource-constrained devices
    • J. Li, X. Tan, X. Chen, D. S. Wong, and F. Xhafa, “OPoR: enabling proof of retrievability in cloud computing with resource-constrained devices,” IEEE Transactions on Cloud Computing, Vol. 3, 2015, pp. 195-205.
    • (2015) IEEE Transactions on Cloud Computing , vol.3 , pp. 195-205
    • Li, J.1    Tan, X.2    Chen, X.3    Wong, D.S.4    Xhafa, F.5
  • 40
    • 84990871477 scopus 로고    scopus 로고
    • Certificateless public auditing scheme for cloud-assisted wireless body area networks
    • D. He, S. Zeadally, and L. Wu, “Certificateless public auditing scheme for cloud-assisted wireless body area networks,” IEEE Systems Journal, 2015, pp. 1-10.
    • (2015) IEEE Systems Journal , pp. 1-10
    • He, D.1    Zeadally, S.2    Wu, L.3
  • 41
    • 84869466694 scopus 로고    scopus 로고
    • Cooperative provable data possession for integrity verification in multi-cloud storage
    • Y. Zhu, H. Hu, G. Ahn, and M. Yu, “Cooperative provable data possession for integrity verification in multi-cloud storage,” IEEE Transactions on Parallel and Distributed Systems, Vol. 23, 2012, pp. 2231-2244.
    • (2012) IEEE Transactions on Parallel and Distributed Systems , vol.23 , pp. 2231-2244
    • Zhu, Y.1    Hu, H.2    Ahn, G.3    Yu, M.4
  • 42
    • 84901667966 scopus 로고    scopus 로고
    • On the security of an efficient dynamic auditing protocol in cloud storage
    • J. Ni, Y. Yu, Y. Mu, and Q. Xia, “On the security of an efficient dynamic auditing protocol in cloud storage,” IEEE Transactions on Parallel and Distributed Systems, Vol. 25, 2014, pp. 2760-2761.
    • (2014) IEEE Transactions on Parallel and Distributed Systems , vol.25 , pp. 2760-2761
    • Ni, J.1    Yu, Y.2    Mu, Y.3    Xia, Q.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.