References
- Y. Deswarte, J.-J. Quisquater, and A. Saidane, "Remote Integrity Checking," in Integrity and Internal Control in Information Systems VI. Vol.140, S. Jajodia and L. Strous, Eds., ed: Springer US, 2004, pp.1-11.
- D. L. G. Filho and P. S. L. M. Barreto, "Demonstrating data possession and uncheatable data transfer," IACR Cryptology ePrint Archive, Vol.2006, pp.150, 2006.
- G. Yamamoto, S. Oda, and K. Aoki, "Fast integrity for large data,"" in Workshop on Software Performance Enhancement for Encryption and Decryption (SPEED 2007), 2007, pp.21-32.
- G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, et al., "Provable data possession at untrusted stores," presented at the Proceedings of the 14th ACM conference on Computer and communications security, Alexandria, Virginia, USA, 2007.
- H. Shacham and B. Waters, "Compact Proofs of Retrievability," presented at the Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, Melbourne, Australia, 2008.
- W. Cong, "Privacy-Preserving Public Auditing for Secure Cloud Storage," IEEE Transactions on Computers, Vol.62, pp. 362-375, 02/01 2013. https://doi.org/10.1109/TC.2011.245
- C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, "Dynamic Probable Data Possession," Proceedings of the 16th ACM conference on Computer and Communications Security (CCS '09), pp.213-222, Nov., 2009.
- Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing," Proceedings of the 14th European conference on Research in computer security (ESORICS '09), pp.355-370, 2009.
- C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," Proceedings of IEEE INFOCOM 2010, pp.1-9, 2010.
- Q. Wang, C. Wang, K. Ren, and W. Lou, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Transactions on Parallel and Distributed Systems, pp.847-859, Mar., 2011.
- K. Yang and X Jia, "Data storage auditing service in cloud computing challenges, methods and opportunities," World Wide Web, Vol.15, pp.409-428, 2012. https://doi.org/10.1007/s11280-011-0138-0
- B. Wang, B. Li, and H. Li, "Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud," Applied Cryptography and Network Security (ACNS), LNCS 7341, pp.507-525, 2012.
- B. Wang, B. Li, and H. Li, "Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud," 2012 IEEE Fifth International Conference on Cloud Computing, pp.295-302, 2012.
- K. Yang and X. Jia, "An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing," IEEE Trans. on Parallel and Distributed Systems, Vol.24, No.9, pp.1717-1726, Sept., 2013. https://doi.org/10.1109/TPDS.2012.278