Data integrity and Auditing for Secured Cloud Data Storage
Abstract
References
B. Wang, B. Li, and H. Li, “Oruta: Privacy-Preserving PublicAuditing for Shared Data in the Cloud,†Proc. IEEE Fifth Int’l Conf.Cloud Computing, pp. 295-302, 2012.
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A.Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, andM. Zaharia, “A View of Cloud Computing,†Comm. ACM,vol. 53, no. 4, pp. 50-58, Apr. 2010.
K. Ren, C. Wang, and Q. Wang, “Security Challenges for the PublicCloud,†IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.
D. Song, E. Shi, I. Fischer, and U. Shankar, “Cloud Data Protectionfor the Masses,†Computer, vol. 45, no. 1, pp. 39-45, 2012.
C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-PreservingPublic Auditing for Data Storage Security in Cloud Computing,â€Proc. IEEE INFOCOM, pp. 525-533, 2010.
B. Wang, M. Li, S.S. Chow, and H. Li, “Computing EncryptedCloud Data Efficiently under Multiple Keys,†Proc. IEEE Conf.Comm. and Network Security (CNS ’13), pp. 90-99, 2013.
R. Rivest, A. Shamir, and L. Adleman, “A Method for ObtainingDigital Signatures and Public Key Cryptosystems,†Comm. ACM,vol. 21, no. 2, pp. 120-126, 1978.
The MD5 Message-Digest Algorithm (RFC1321). https://tools.ietf.org/html/rfc1321, 2014.
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner,Z. Peterson, and D. Song, “Provable Data Possession atUntrusted Stores,†Proc. 14th ACM Conf. Computer and Comm.Security (CCS ’07), pp. 598-610, 2007.
H. Shacham and B. Waters, “Compact Proofs of Retrievability,â€Proc. 14th Int’l Conf. Theory and Application of Cryptology and InformationSecurity: Advances in Cryptology (ASIACRYPT ’08), pp. 90-107, 2008.
C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia,“Dynamic Provable Data Possession,†Proc. 16th ACM Conf. Computerand Comm. Security (CCS’09), pp. 213-222, 2009.
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling PublicVerifiability and Data Dynamic for Storage Security in CloudComputing,†Proc. 14th European Conf. Research in Computer Security(ESORICS’09), pp. 355-370, 2009.
C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data StorageSecurity in Cloud Computing,†Proc. 17th Int’l Workshop Quality ofService (IWQoS’09), pp. 1-9, 2009.
B. Chen, R. Curtmola, G. Ateniese, and R. Burns, “Remote DataChecking for Network Coding-Based Distributed Storage Systems,â€Proc. ACM Workshop Cloud Computing Security Workshop(CCSW’10), pp. 31-42, 2010.
Y. Zhu, H. Wang, Z. Hu, G.-J.Ahn, H. Hu, and S.S Yau,“Dynamic Audit Services for Integrity Verification of OutsourcedStorages in Clouds,†Proc. ACM Symp. Applied Computing(SAC’11), pp. 1550-1557, 2011.
N. Cao, S. Yu, Z. Yang, W. Lou, and Y.T. Hou, “LT Codes-BasedSecure and Reliable Cloud Storage Service,†Proc. IEEE INFOCOM,2012.
B. Wang, B. Li, and H. Li, “Certificateless Public Auditing forData Integrity in the Cloud,†Proc. IEEE Conf. Comm. and NetworkSecurity (CNS’13), pp. 276-284, 2013.
C. Wang, S.S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-PreservingPublic Auditing for Secure Cloud Storage,†IEEE Trans.Computers, vol. 62, no. 2, pp. 362-375, Feb. 2013.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â