Secrecy Stabilizing for Cloud Storage With Assessing Of Third Party
Abstract
Keywords
References
P. Mell and T. Grance, “Draft NIST working definition of cloud computing,†Referenced on June. 3rd, 2009 Online at http://csrc.nist.gov/groups/SNS/cloud-computing/index. html, 2009.
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the clouds: A berkeley view of cloud computing,†University of California, Berkeley, Tech. Rep. UCB-EECS-2009-28, Feb 2009.
M. Arrington, “Gmail disaster: Reports of mass email deletions,†Online at http://www.techcrunch.com/2006/ 12/28/gmail-disasterreports-of-mass-email-deletions/, December 2006.
J. Kincaid, “MediaMax/TheLinkup Closes Its Doors,†Online at http://www.techcrunch.com/2008/07/10/ mediamaxthelinkup-closes-its-doors/, July 2008.
Amazon.com, “Amazon s3 availability event: July 20, 2008 ,†Online at http://status.aws.amazon.com/s3-20080720.html, 2008.
S. Wilson, “Appengine outage,†Online at http://www.
cio-weblog.com/50226711/appengine outage.php, June 2008.
B. Krebs, “Payment Processor Breach May Be Largest Ever,†Online at http://voices.washingtonpost.com/securityfix/ 2009/01/payment processor breach may b.html, Jan. 2009.
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,†in Proc. of CCS’07, Alexandria, VA, October 2007, pp. 598–609.
M. A. Shah, R. Swaminathan, and M. Baker, “Privacypreserving audit and extraction of digital contents,†Cryptology ePrint Archive, Report 2008/186, 2008.
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,†in Proc. of ESORICS’09, volume 5789 of LNCS. Springer-Verlag, Sep. 2009, pp. 355–370.
A. Juels and J. Burton S. Kaliski, “Pors: Proofs of retrievability for large files,†in Proc. of CCS’07, Alexandria, VA, October 2007, pp. 584–597.
Cloud Security Alliance, “Security guidance for critical areas of focus in cloud computing,†2009, http://www. cloudsecurityalliance.org.
H. Shacham and B. Waters, “Compact proofs of retrievability,†in Proc. of Asiacrypt 2008, vol. 5350, Dec 2008, pp. 90–107.
M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, “Auditing to keep online storage services honest,†in Proc. of HotOS’07. Berkeley, CA, USA: USENIX Association, 2007, pp.
– 6.
104th United States Congress, “Health Insurance Portability and Accountability Act of 1996 (HIPPA),†Online at http:// aspe.hhs.gov/admnsimp/pl104191.htm, 1996.
S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained access control in cloud computing,†in Proc. of IEEE INFOCOM’10, San Diego, CA, USA, March
D. Boneh, B. Lynn, and H. Shacham, “Short signatures from the Weil pairing,†J. Cryptology, vol. 17, no. 4, pp. 297–319 , 2004.
A. L. Ferrara, M. Greeny, S. Hohenberger, and M. Pedersen, “Practical short signature batch verification,†in Proceedings of CT-RSA, volume 5473 of LNCS. Springer-Verlag, 2009, pp. 309 – 324.
G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,†in Proc. of SecureComm’08, 2008, pp. 1–10.
C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring data storage security in cloud computing,†in Proc. of IWQoS’09, July 2009, pp. 1 – 9.
C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,†in Proc. of CCS’09, 2009 , pp. 213–222.
R. C. Merkle, “Protocols for public key cryptosystems,†in Proc. of IEEE Symposium on Security and Privacy, Los Alamitos, CA, USA, 1980.
G. Ateniese, S. Kamara, and J. Katz, “Proofs of storage from homomorphic identification protocols,†in ASIACRYPT, 2009 , pp. 319–333.
M. Bellare and G. Neven, “Multi-signatures in the plain publickey model and a general forking lemma,†in ACM Conference on Computer and Communications Security, 2006, pp. 390–399.
Y. Dodis, S. P. Vadhan, and D. Wichs, “Proofs of retrievability via hardness amplification,†in TCC, 2009, pp. 109–127.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â