Computer Science ›› 2024, Vol. 51 ›› Issue (12): 310-316.doi: 10.11896/jsjkx.231100085
• Information Security • Previous Articles Next Articles
AN Ruicheng, WANG Huaqun
CLC Number:
[1]YANG K,JIA X.Data storage auditing service in cloud computing:challenges,methods and opportunities[J].World Wide Web,2012,15:409-428. [2]ATENIESE G,BURNS R,CURTMOLA R,et al.Provable data possession at untrusted stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.2007:598-609. [3]DODIS Y,KATZ J,XU S,et al.Key-insulated public key crypto-systems[C]//Advances in Cryptology—EUROCRYPT 2002:International Conference on the Theory and Applications of Cryptographic Techniques Amsterdam,The Netherlands,April 28-May 2,2002 Proceedings 21.Springer Berlin Heidelberg,2002:65-82. [4]YUAN Y,ZHU H L,CHEN Y L,et al.Survey of data integrity verification technology based on provable data possession[J].Computer Engineering and Applications,2019,55(18):1-7,52. [5]JUELS A,KALISKI JR B S.PORs:Proofs of retrievability forlarge files[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.2007:584-597. [6]SHACHAM H,WATERS B.Compact proofs of retrievability[J].Journal of Cryptology,2013,26(3):442-483. [7]WANG C,CHOW S S M,WANG Q,et al.Privacy-preserving public auditing for secure cloud storage[J].IEEE Transactions on Computers,2011,62(2):362-375. [8]ATENIESE G,DI PIETRO R,MANCINI L V,et al.Scalable and efficient provable data possession[C]//Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks.2008:1-10. [9]WANG Q,WANG C,REN K,et al.Enabling public auditability and data dynamics for storage security in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems,2010,22(5):847-859. [10]ERWAY C C,KÜPÇÜ A,PAPAMANTHOU C,et al.Dynamic provable data possession[J].ACM Transactions on Information and System Security(TISSEC),2015,17(4):1-29. [11]ZHAO J,XU C,LI F,et al.Identity-based public verification with privacy-preserving for data storage security in cloud computing[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2013,96(12):2709-2716. [12]WANG H,WU Q,QIN B,et al.Identity-based remote data possession checking in public clouds[J].IET Information Security,2014,8(2):114-121. [13]WANG H.Identity-based distributed provable data possession in multicloud storage[J].IEEE Transactions on Services Computing,2014,8(2):328-340. [14]ZHANG J,DONG Q.Efficient ID-based public auditing for the outsourced data in cloud storage[J].Information Sciences,2016,343:1-14. [15]HE D,WANG H,ZHANG J,et al.Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage[J].Information Sciences,2017,375:48-53. [16]WANG H.Proxy provable data possession in public clouds[J].IEEE Transactions on Services Computing,2012,6(4):551-559. [17]WANG H,HE D,TANG S.Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud[J].IEEE Transactions on Information Forensics and Security,2016,11(6):1165-1176. [18]WANG Y,WU Q,QIN B,et al.Identity-based data outsourcing with comprehensive auditing in clouds[J].IEEE Transactions on Information Forensics and Security,2016,12(4):940-952. [19]PATERSON K G,SCHULDT J C N.Efficient identity-based signatures secure in the standard model[C]//Australasian Conference on Information Security and Privacy.Berlin,Heidelberg:Springer,2006:207-222. [20]YU H,CAI Y,KONG S,et al.Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy[J].KSII Transactions on Internet & Information Systems,2017,11(10):5039-5061. [21]ZHAO J,XU C,CHEN K.Detailed analysis and improvement of an efficient and secure identity-based public auditing for dynamic outsourced data with proxy[J].Journal of Information Security and Applications,2019,47:39-49. [22]YU J,REN K,WANG C,et al.Enabling cloud storage auditing with key-exposure resistance[J].IEEE Transactions on Information Forensics and Security,2015,10(6):1167-1179. [23]YU J,REN K,WANG C.Enabling cloud storage auditing with verifiable outsourcing of key updates[J].IEEE Transactions on Information Forensics and Security,2016,11(6):1362-1375. [24]YU J,WANG H.Strong key-exposure resilient auditing for secure cloud storage[J].IEEE Transactions on Information Forensics and Security,2017,12(8):1931-1940. [25]SHEN W,YU J,YANG M,et al.Efficient identity-based data integrity auditing with key-exposure resistance for cloud storage[J].IEEE Transactions on Dependable and Secure Computing,2022,20(6):4593-4606. [26]ZHANG X,WANG H,XU C.Identity-based key-exposure resi-lient cloud storage public auditing scheme from lattices[J].Information Sciences,2019,472:223-234. [27]ZHANG X S,LI C,LIU Z H.Key-exposure resilient integrity auditing scheme with encrypted data deduplication[J].Journal on Communications,2019,40(4):95-106. [28]NITHYA S M V,UTHARIARAJ V R.Identity-based public auditing scheme for cloud storage with strong key-exposure resilience[J].Security and Communication Networks,2020,2020:1-13. |
[1] | YUE Meng, WEN Cheng, HONG Xueting, YAN Simin. Airborne Software Provable Data Possession for Cloud Storage [J]. Computer Science, 2024, 51(11A): 240400040-10. |
[2] | XIA Jingxuan, SHEN Guowei, GUO Chun, CUI Yunhe. USPS:User-space Cross Protocol Proxy System for Efficient Collaboration of Computing Power Resources [J]. Computer Science, 2023, 50(11): 348-355. |
[3] | TANG Fei, CHEN Yun-long, FENG Zhuo. Electronic Prescription Sharing Scheme Based on Blockchain and Proxy Re-encryption [J]. Computer Science, 2021, 48(6A): 498-503. |
[4] | JIANG Hao-kun, DONG Xue-dong, ZHANG Cheng. Improved Certificateless Proxy Blind Signature Scheme with Forward Security [J]. Computer Science, 2021, 48(6A): 529-532. |
[5] | XU Kun, FU Yin-jin, CHEN Wei-wei, ZHANG Ya-nan. Research Progress on Blockchain-based Cloud Storage Security Mechanism [J]. Computer Science, 2021, 48(11): 102-115. |
[6] | CHEN Li-feng, ZHU Lu-ping. Encrypted Dynamic Configuration Method of FPGA Based on Cloud [J]. Computer Science, 2020, 47(7): 278-281. |
[7] | FENG Tao, JIAO Ying, FANG Jun-li, TIAN Ye. Medical Health Data Security Model Based on Alliance Blockchain [J]. Computer Science, 2020, 47(4): 305-311. |
[8] | SU Xiang,HU Jian-wei,CUI Yan-peng. Easy-to-deploy Dynamic Monitoring Scheme for Android Applications [J]. Computer Science, 2020, 47(2): 262-268. |
[9] | JIANG Ze-tao, XU Juan-juan. Efficient Heterogeneous Cross-domain Authentication Scheme Based on Proxy Blind Signature in Cloud Environment [J]. Computer Science, 2020, 47(11): 60-67. |
[10] | BAI Li-fang, ZHU Yue-fei, LU Bin. Research and Development of Data Storage Security Audit in Cloud [J]. Computer Science, 2020, 47(10): 290-300. |
[11] | WANG Xing-wei, HOU Shu-hui. Improved Efficient Proxy Blind Signature Scheme [J]. Computer Science, 2019, 46(6A): 358-361. |
[12] | XIE Si-jiang,JIA Bei,WANG He,XU Shi-cong. Cloud Big Data Integrity Verification Scheme Based on Multi-branch Tree [J]. Computer Science, 2019, 46(3): 188-196. |
[13] | WANG Jing, SI Shu-jian. Attribute Revocable Access Control Scheme for Brain-Computer Interface Technology [J]. Computer Science, 2018, 45(9): 187-194. |
[14] | PANG Xiao-qiong, REN Meng-qi, WANG Tian-qi, CHEN Wen-jun, NIE Meng-fei. Perfect Privacy-preserving Batch Provable Data Possession [J]. Computer Science, 2018, 45(11): 130-137. |
[15] | YAO Hong-di and ZOU Hai. Quantum Multi-proxy Blind Signature Protocol [J]. Computer Science, 2017, 44(7): 104-106. |
|