Citation: | REN Zhengwei, WANG Lina, WU Qianhong, et al., “Data Dynamics Enabled Privacy-Preserving Public Batch Auditing in Cloud Storage,” Chinese Journal of Electronics, vol. 23, no. 2, pp. 297-301, 2014, |
P. Mell, T. Grance, "Draft nist working definition of cloud computing", Available:http://csrc.nist.gov/groups/SNS/cloudcomlinebreak puting/index.html, 2009.
|
L.N. Wang, Z.W. Ren, Y.W. Yu, et al, "A data assured deletion approach adapted for cloud storage", Acta Electronica Sinica, Vol.40, No.2, pp.266-272, 2012. (in Chinese)
|
M. Armbrust, A. Fox, R. Griffith, et al, "Above the clouds: A berkeley view of cloud computing", University of California, Berkeley, Tech. Rep. UCB-EECS-2009-28, 2009.
|
Amazon.com, Amazon s3 availability event: July 20, 2008, Available: http://status.aws.amazon.com/s3-20080720.html, 2008.
|
B. Krebs, Payment processor breach may be largest ever, Available: http://voices.washingtonpost.com/securityfix/2009/ 01/payment_processor_breach_may_b.html, 2009.
|
G. Ateniese, R. Burns, R. Curtmola, et al, "Provable data possession at untrusted stores", Proceedings of CCS'07, Alexandria, USA, pp.598-609, 2007.
|
Q.Wang, C.Wang, J.Li, et al, "Enabling public verifiability and data dynamic for storage security in cloud computing", Proceedings of ESORICS'09, Saint Malo, France, pp.355-370, 2009.
|
A. Juels, B.S. Kaliski, "PORs: Proofs of retrievability for large files" Proceedings of CCS'07, Alexandria, USA, pp.584-597, 2007.
|
H. Shacham, B. Water, "Compact proofs of retrievability", Proceeding of Asiacrypt'08, Melbourne, Australia, pp.90-107, 2008.
|
C. Wang, Q. Wang, K. Ren, et al, "privacy-preserving public auditing for data storage security in cloud computing", Proceedings of INFOCOM'10, San Diego, USA, pp.1-9, 2010.
|
Y. Zhu, H. Wang, Z. Hu, et al, "Cooperative provable data possession", Technical Report, Cryptology ePrint Archive: Report 2010/234, http://eprint.iacr.org/2010/234, 2010.
|
Q. Zheng, S. Xu, "Fair and dynamic proofs of retrievability", Proceedings of CODASPY11, San Antonio, USA, pp.237-248, 2011.
|
D. Boneh, B. Lynn, H. Shacham, "Short signatures from the weil pairing", Journal of Cryptology, Vol.17, No.4, pp.297-319, 2004.
|
D. Boneh, C. Gentry, "Aggregate and verifiable encrypted signatures from bilinear maps", Proceedings of Eurocrypt'03, Warsaw, Poland, pp.416-432, 2003.
|