Bilinear Aggregate Signature and PDP Encryption in Audit Service for Cloud Storage
Abstract
Keywords
Full Text:
PDFReferences
Armando Fox, Michael Armbrust “A view on cloud computing” IEEE/ACM Trans. Networking, 2010.
Beuchat J.L., Brisebarre, N., Detrey, J., Okamoto, E. “Arithmetic Operators for Pairing-Based Cryptography” Internet Engineering Task Force, RFC 896, 2007.
Ramya Sree Uppalapati, K.Nagi Reddy “Achievement of liability, Auditability and reliance in cloud computing” Internet Engineering Task Force, RFC 896, 2011.
D. Kumuthavijay, J. Nandhini, V. Jayaprakasan “Implementation of Efficient Audit Service Outsourcing for Data Integrity by Interfacing the Mobile Device in Clouds” ACM Comput. Commun. Rev., 2013.
Dan Boneh, Matt Franklin “Identity-Based Encryption from the Weil Pairing” ACM Comput. Commun. Rev., 2011.
Jianying Zhou and Moti Young, “Applied Cryptography and Network Security”, Springer 2005
G.Ateniese . R.Burns, R.Curtmola,J.Herring and D.Song, “Provable Data Possession at Untrusted Stores”, in CCS, pp. 598-609,ACM, 2007
Henk C.A van Tilborg, “Encyclopedia of Cryptography and Security”, Springer 2005
G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, “Scalable and Efficient Provable Data Possession,” Proc. Fourth Int’l Conf. Security and Privacy in Comm. Netowrks (SecureComm), pp. 1-10, 2008.
C.C. Erway, A. Ku¨ pc¸u¨ , C. Papamanthou, and R. Tamassia, “Dynamic Provable Data Possession,” Proc. 16th ACM Conf. Computer and Comm. Security, pp. 213-222, 2009.
C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” Proc. IEEE INFOCOM, pp. 1-9, 2010.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.