References
- Dropbox for Business. [Online]. Available: https://www.dropbox.com/business, accessed Jan. 14, 2016.
- Google Drive. [Online]. Available: https://drive.google.com/, accessed Jan. 14, 2016.
- iCloud. [Online]. Available: https://www.icloud.com/, accessed Jan. 14, 2016.
- G. Ateniese, R. Burns, R. Curtmola, H. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," in Proc. of the 14th ACM Conf. on Computer and Communications Security, CCS 2007, pp.598-609, 2007.
- A. Juels and B.S. Kaliski, "PORs: Proofs of retrievability for large files," in Proc. of the 14th ACM Conf. on Computer and Communications Security, CCS 2007, pp.584-597, 2007.
- G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, "Scalable and efficient provable data possession," in Proc. of the 4th Int. Conf. on Security and privacy in Communication networks, SecureComm 2008, pp.1-10, 2008.
- H. Shacham and B. Waters, "Compact proofs of retrievability," in Proc. of the 14th annual Int. Conf. on the theory and application of cryptology & information security, ASIACRYPT 2008, pp.90-107, 2008.
- C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring data storage security in cloud computing," in Proc. of the 17th IEEE Int. Workshop on Quality of Services, IWQoS 2009, pp.1-9, 2009.
- Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing," in Proc. of the 14th European Symposium on Research in Computer Security, ESORICS 2009, pp.355-370, 2009.
- C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, "Dynamic Provable Data Possession," in Proc. of the 16th ACM Conf. on Computer and Communications Security, CCS 2009, pp.213-222, 2009.
- C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing," in Proc. of the 29th IEEE Conf. on Computer Communications, INFOCOM 2010, pp.525-533, 2010.
- C. Wang, Q. Wang, K. Ren, and L. Lou, "Towards Secure and Dependable Storage Services in Cloud Computing," IEEE Transactions on Services Computing, vol. 5, no. 2, pp.220-232, 2012. https://doi.org/10.1109/TSC.2011.24
- B. Wang, B. Li, and H. Li, "Oruta: Privacy-preserving public auditing for shared data in the cloud," in Proc. of the 5th IEEE Int. Conf. on Cloud Computing, CLOUD 2012, pp.295-302, 2012.
- C. Wang, S.S.M. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for secure cloud storage," IEEE Transactions on Computers, vol. 62, no.2, pp.362-375, 2013. https://doi.org/10.1109/TC.2011.245
- H. Wang, "Proxy provable data possession in public clouds," IEEE Transactions on Services Computing, vol. 6, no. 4, pp.551-559, 2013. https://doi.org/10.1109/TSC.2012.35
- B. Wang, B. Li, and H. Li, "Public auditing for shared data with efficient user revocation in the cloud," in Proc. of the 32th IEEE Int. Conf. on Computer Communications, INFOCOM 2013, pp.2904-2912, 2013.
- J. Yuan and S. Yu, "Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud," in Proc. of the 2013 Int. workshop on Security in cloud computing , AISACCS-SCC 2013, pp.19-26, 2013.
- S.G. Worku, C. Xu, J. Zhao, and X. He, "Secure and efficient privacy-preserving public auditing scheme for cloud storage," Computers & Electrical Engineering, vol. 40, no. 5, pp.1703-1713, 2014. https://doi.org/10.1016/j.compeleceng.2013.10.004
- Y. Yu, J. Ni, M.H. Au, Y. Mu, B. Wang, and H. Li, "On the Security of a Public Auditing Mechanism for Shared Cloud Data Service," IEEE Transactions on Services Computing, vol. 8, no. 6, pp.998-999, 2014. https://doi.org/10.1109/TSC.2014.2355201
- F. Armknecht, JM. Bohli, GO. Karame, Z. Liu, and CA. Reuter, "Outsourced Proofs of Retrievability," in Proc. of the 2014 ACM SIGSAC Conf. on Computer and Communications Security, CCS 2014, pp.831-843, 2014.
- T. Jiang, X. Chen, and J. Ma, "Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation," IEEE Transactions on Computers, vol. PP, no. 99, pp.1-12, 2015.
- A. F. Barsoum and M. A. Hasan, "Provable multicopy dynamic data possession in cloud computing systems," IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp.485-497, 2015. https://doi.org/10.1109/TIFS.2014.2384391
- G. Yang, J. Yu, W. Shen, Q. Su, Z. Fu, and R. Hao, "Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability," The Journal of Systems and Software, vol. 113, pp.130-139, 2016. https://doi.org/10.1016/j.jss.2015.11.044
- J. Yu, K. Ren, and C. Wang, "Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates," IEEE Transactions on Information Forensics and Security, vol. 11, no. 6, pp.1362-1375, 2016. https://doi.org/10.1109/TIFS.2016.2528500
- Y. Li, Y. Yu, B. Yang, G. Min, and H. Wu, "Privacy preserving cloud data auditing with efficient key update," Future Generation Computer Systems, available online, 2016.
- Q. Zheng, and S. Xu, "Secure and efficient proof of storage with deduplication," in Proc. of the 2nd ACM Conf. on Data and Application Security and Privacy, CODASPY 2012, pp.1-12, 2012.
- Y. Shin, D. Koo, J. Hur, and J. Yun, "Secure proof of storage with deduplication for cloud storage systems," Multimedia Tools and Application, pp.1-16, 2015.
- J. Yuan and S. Yu, "Secure and Constant Cost Public Cloud Storage Auditing with Deduplication," in Proc. of the IEEE Conf. on Communications and Network Security, CNS 2013, pp.145-153, 2013.
- J. Li, J. Li, D. Xie, and Z. Cai, "Secure Auditing and Deduplicating Data in Cloud," IEEE Transactions on Computers, vol. PP, no. 99, pp.1-11, 2015.
- N. Alkhojandi and A. Miri, "Privacy-Preserving Public Auditing in Cloud Computing with Data Deduplication," in Proc. of the 8th Int. Symp. on Foundations & Practice of Security, FPS 2015, pp.35-48, 2015.
- K. He, J. Chen, R. Du, Q. Wu, G. Xue, and X. Zhang, "DeyPoS: Duplicatable Dynamic Proof of Storage for Multi-User Environments," IEEE Transactions on Computers, Vol. 65, no. 12, 2016.
- F. Bao, R.H. Deng, and H. Zhu, "Variations of Diffie-Hellman Problem," in Proc. of the 5th Int. Conf. of Information and Communications Security, ICICS 2003, pp.301-312, 2003.
- D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing," in Proc. of the 7th annual Int. Conf. on the theory and application of cryptology & information security, ASIACRYPT 2001, pp.514-532, 2001.
Cited by
- ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification vol.2018, pp.None, 2017, https://doi.org/10.1155/2018/3205898
- ID-Based Public Auditing Protocol for Cloud Storage Data Integrity Checking with Strengthened Authentication and Security vol.23, pp.4, 2017, https://doi.org/10.1007/s11859-018-1335-9