Computer Science ›› 2018, Vol. 45 ›› Issue (3): 144-150.doi: 10.11896/j.issn.1002-137X.2018.03.023
Previous Articles Next Articles
JIN Yu, CAI Chao, HE Heng and LI Peng
[1] DESWARTE Y,QUISQUATER J J,SADANE A.Remote Integrity Checking[M]∥Integrity and Internal Control in Information System VI.2004:1-11. [2] SEBE F,MARTINEZ-BALLESTE A,DESWARTE Y.Time-bounded remote file integrity checking:Technical Report 04429[R].2004. [3] ATENIESE G,BURNS R,CURTMOLA R,et al.Provable data possession at untrusted stores[C]∥ACM Conference on Computer and Communications Security.ACM,2007:598-609. [4] JUELS A,KALISKI B S.Pors:proofs of retrievability for large files[C]∥ACM Conference on Computer and Communications Security.ACM,2007:584-597. [5] SHACHAM H,WATERS B.Compact Proofs of Retrievability[M]∥Advances in Cryptology-SIACRYPT 2008.Springer Berlin Heidelberg,2008:442-483. [6] DAN B,LYNN B,SHACHAM H.Short Signatures from the Weil Pairing[J].Journal of Cryptology,2004,17(4):297-319. [7] SHACHAM H,WATERS B.Compact Proofs of Retrievability[C]∥Proc.14th Int’l Conf.Theory and Application of Crypto-logy and Information Security:Advances in Cryptology (ASIACRYPT’08).2008:90-107. [8] WANG Q,WANG C,REN K,et al.Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing[J].IEEE Transactions on Parallel & Distributed Systems,2011,22(5):847-859. [9] WANG C,WANG Q,REN K,et al.Privacy-preserving public auditing for data storage security in cloud computing[J].Proceedings-IEEE INFOCOM,2010,62(2):525-533. [10] YANG K,JIA X.An Efficient and Secure Dynamic AuditingProtocol for Data Storage in Cloud Computing[J].IEEE Tran-sactions on Parallel & Distributed Systems,2013,24(9):1717-1726. [11] LIU C,ZHANG X,YANG C,et al.Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-grained Updates[J].IEEE Transactions on Parallel & Distributed Systems,2013,25(9):2234-2244. [12] BLAZE M,BLEUMER G,STRAUSS M.Divertible protocolsand atomic proxy cryptography[J].Eurocrypt,1998,3:127-144. [13] CHAUM D.Blind Signatures for Untraceable Payments[M]∥Advances in Cryptology.Springer US,1983:199-203. [14] WANG B,CHOW S S M,LI M,et al.Storing Shared Data on the Cloud via Security-Mediator[C]∥IEEE International Conference on Distributed Computing Systems.IEEE Computer Society,2013:124-133. [15] WANG B,LI B,LI H.Panda:Public Auditing for Shared Data with Efficient User Revocation in the Cloud[J].IEEE Transactions on Services Computing,2015,8(1):92-106. [16] RANJITH G,CHANDRA J V,SAGARIKA P,et al.Intelli-gence based Authentication- Authorization and Auditing for secured data storage[J].Journal of Advanced in Engineering and Technology,2015,8(4):628-636. [17] HE K,HUANG C H,ZHOU C H,et al.Public auditing for encryption data with client-side deduplication in cloud storage[J].Wuhan University Journal of Natural Sciences,2015,20(4):291-298. [18] HE K,HUANG C H,SHI J L,et al.Public Integrity Auditing for Dynamic Regenerating Code Based Cloud Storage[C]∥IEEE Symposium on Computers and Communication (ISCC).2016:581-588. [19] SHEN W T,YU J,XIA H,et al.Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium[J].Journal of Network and Computer Applications,2017,82:56-64. [20] ZHU Y,WANG H,HU Z,et al.Dynamic audit services for integrity verification of outsourced storages in clouds[C]∥Proceedings of the 2011 ACM Symposium on Applied Computing.ACM,2011:1550-1557. |
No related articles found! |
|