Ensuring Security and Dynamic Operation Support for Storage Services in Cloud Computing
Abstract
Keywords
Full Text:
PDFReferences
Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring data storage security in cloud computing,” in Proc. of IWQoS’09, July 2009, pp. 1–9.
Amazon.com, “Amazon web services (aws),” Online at http:// aws.amazon.com/, 2009.
Sun Microsystems, Inc., “Building customer trust in cloud computing with transparent security,” Online at https://www.sun. com/offers/details/sun transparency.xml, November 2009.
M. Arrington, “Gmail disaster: Reports of mass email deletions,” Online at http://www.techcrunch.com/2006/12/ 28/gmail- isasterreports-of-mass-email-deletions/, December 2006.
K. D. Bowers, A. Juels, and A. Oprea, “Proofs of retrievability: Theory and implementation,” in Proc. of ACM workshop on Cloud Computing security (CCSW’09), 2009, pp. 43–54.
L. Carter and M. Wegman, “Universal hash functions,” Journal of Computer and System Sciences, vol. 18, no. 2, pp. 143–154, 1979.
J. Hendricks, G. Ganger, and M. Reiter, “Verifying distributed erasure-coded data,” in Proc. of 26th ACM Symposium on Principles of Distributed Computing, 2007, pp. 139–146.
J. S. Plank and Y. Ding, “Note: Correction to the 1997 tutorial on reed-solomon coding,” University of Tennessee, Tech. Rep. CS-03- 504, April 2003.
Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for storage security in cloud computing,” in Proc. of IEEE INFOCOM’10, San Diego, CA, USA, March 2010.
C. Wang, K. Ren, W. Lou, and J. Li, “Towards publicly auditable secure cloud data storage services,” IEEE Network Magazine, vol. 24, no. 4, pp. 19–24, 2010.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.