Providing Secured Data Storage by Privacy and Third Party Auditing in Cloud
Abstract
Keywords
Full Text:
PDFReferences
Cong Wang, Qian Wang, Kui Ren and Wenjing Lou, ―Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing‖ This paper was presented as part of the main Technical Program at IEEE INFOCOM 2010.
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, ―Provable data possession at untrusted stores,‖ Cryptology ePrint Archive, Report 2007/202, 2007, http://eprint.iacr.org/.
M. A. Shah, R. Swaminathan, and M. Baker, ―Privacy-preserving audit and extraction of digital contents,‖ Cryptology ePrint Archive, Report 2008/186, 2008, http://eprint.iacr.org/.
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, ―Enabling public verifiability and data dynamics for storage security in cloud computing,‖ in Proc. of ESORICS’09, Saint Malo, France, Sep. 2009.
H. Shacham and B. Waters, ―Compact proofs of retrievability,‖ in Proc. of Asiacrypt 2008, vol. 5350, Dec 2008, pp. 90–107
A. Juels and J. Burton S. Kaliski, ―Pors: Proofs of retrievability for large files,‖ in Proc. of CCS’07, Alexandria, VA, October 2007, pp. 584–597.
M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, ―Auditing to keep online storage services honest,‖ in Proc. of HotOS’07. Berkeley, CA, USA: USENIX Association, 2007, pp. 1–6.
Shucheng .Y, C. Wang, K. Ren, and W. Lou, ―Achieving secure, scalablea,nd fine- rained access control in cloud computing,‖ in Proc. Of IEEE INFOCOM’1 0 ,San Diego, CA, USA, March 2010
C. Wang, Q. Wang, K. Ren, and W. Lou, ―Ensuring data storage security in cloud computing,‖ in Proc. of IWQoS’09, July 2009.
C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, ―Dynamic provable data possession,‖ in Proc. of CCS’09, 2009
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.