Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data |
Shen, Wenting
(College of Information Engineering, Qingdao University)
Yu, Jia (College of Information Engineering, Qingdao University) Yang, Guangyang (College of Information Engineering, Qingdao University) Zhang, Yue (College of Information Engineering, Qingdao University) Fu, Zhangjie (School of Computer and Software, Nanjing University of Information Science & Technology) Hao, Rong (College of Information Engineering, Qingdao University) |
1 | K. Ren, C. Wang and Q. Wang, “Security Challenges for the Public Cloud,” IEEE Internet Computing, vol. 16, pp. 69-73, 2012. Article (CrossRef Link) DOI |
2 | D. Song, E. Shi, I. Fischer and U. Shankar, “Cloud Data Protection for the Masses,” IEEE Computer, vol. 45, no. 1, pp. 39-45, 2012. Article (CrossRef Link) DOI |
3 | M. Arrington, "Gmail Disaster: Reports of Mass Email Deletions," Online at http://techcrunch.com/2006/12/28/gmail-disaster-reports-of-mass-email-deletions/, 2006. Article (CrossRef Link) |
4 | Amazon S3 Team. Amazon S3 Availability Event: July 20, 2008. Online at http://status.aws.amazon.com/s3-20080720.html, 2008. Article (CrossRef Link) |
5 | K. Yang and X. Jia, “Data storage auditing service in cloud computing: challenges, methods and opportunities,” World Wide Web, vol. 15, no. 4, pp. 409-428, 2012. Article (CrossRef Link) DOI |
6 | G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson and D. Song, "Provable Data Possession at Untrusted Stores," in Proc. of ACM CCS 2007, pp. 598-610, 2007. Article (CrossRef Link) |
7 | H. Shacham and B. Waters, "Compact Proofs of Retrievability," in Proc. of ASIACRYPT 2008, Springer-Verlag, pp. 90-107, 2008. Article (CrossRef Link) |
8 | C. Wang, Q. Wang, K. Ren and W. Lou, "Ensuring Data Storage Security in Cloud Computing," in Proc. of ACM/ IEEE IWQoS. 2009, pp. 1-9, 2009. Article (CrossRef Link) |
9 | N. Cao, S. Yu, Z. Yang, W. Lou and Y. T. Hou, "LT Codes-based Secure and Reliable Cloud Storage Service," in Proc. of IEEE INFOCOM 2012, pp. 693-701, March 25-30, 2012. Article (CrossRef Link) |
10 | C. Wang, S. Chow, Q. Wang, K. Ren and W. Lou, “Privacy Preserving Public Auditing for Secure Cloud Storage,” IEEE Transactions on Computers, vol. 62, no. 2, pp. 362-375, 2013. Article (CrossRef Link) DOI |
11 | S. G. Worku, C. Xu, J. Zhao and X. He, “Secure and efficient privacy-preserving public auditing scheme for cloud storage,” Computers and Electrical Engineering, vol. 40, no. 5, pp. 1703-1713, 2014. Article (CrossRef Link) DOI |
12 | C. Erway, A. Küpçü, C. Papamanthou and R. Tamassia, "Dynamic Provable Data Possession," in Proc. of the 16th ACM Conference on Computer and Communications Security (CCS'09), pp. 213-222, 2009. Article (CrossRef Link) |
13 | Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu and S. S. Yau, "Dynamic Audit Services for Integrity Verification of Outsourced Storage in Clouds," in Proc. of ACM SAC 2011, pp. 1550-1557, 2011. Article (CrossRef Link) |
14 | Q. Wang, C. Wang and K. Ren, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011. Article (CrossRef Link) DOI |
15 | Z. Mo, Y. Zhou and S. Chen, "A Dynamic Proof of Retrievability (PoR) Scheme with O(logn) Complexity," in Proc. of Communication(ICC), 2012 IEEE Information Conference on IEEE, pp. 912-916, June 10-15, 2012. Article (CrossRef Link) |
16 | C. Liu, J. Chen and T. Yang, “Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-grained Updates,” IEEE Transactions on Parallel and Distributed Systems, vol.25, no.9, pp. 2234-2244, 2014. Article (CrossRef Link) DOI |
17 | Y. Zhang and M. Blanton, "Efficient Dynamic Provable Possession of Remote Data via Balanced Update Trees," in Proc. of Department of the 8th ACM SIGSAC symposium on Information, computer and communications security. ACM, pp.183-194, 2013. Article (CrossRef Link) |
18 | J. Yu, K. Ren, C. Wang and V. Varadharajan, “Enabling Cloud Storage Auditing with Key-Exposure Resistance,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 6, pp.1167-1179, 2015. Article (CrossRef Link) DOI |
19 | J. Yu, R. Hao, H. Zhao, M. Shu, and J. Fan, “IRIBE: Intrusion-Resilient Identity-Based Encryption,” Information Sciences, Vol. 329, pp. 90-104, 2016. Article (CrossRef Link) DOI |
20 | J. Yu, K. Ren, and C. Wang, “Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates,” IEEE Transactions on Information Forensics and Security, Vol. 11, No. 5, pp. 1362 – 1375, 2016. Article (CrossRef Link) DOI |
21 | G. Yang, J. Yu, W. Shen, Q. Su, Z. Fu, and R. Hao, “Enabling Public Auditing for Shared Data in Cloud Storage Supporting Identity Privacy and Traceability,” Journal of Systems and Software, Vol. 113, pp. 130-139, 2016. Article (CrossRef Link) DOI |
22 | Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, “Mutual verifiable provable data auditing in public cloud storage,” Journal of Internet Technology, Vol. 16, No. 2, pp. 317-323, 2015. Article (CrossRef Link) DOI |
23 | H. Wang, Q. Wu, B. Qin and J. Domingo-Ferrer, “Identity-based remote data possession checking in public clouds,” Information Security, IET, vol.8, no.2, pp.114-121, 2014. Article (CrossRef Link) DOI |
24 | B. Wang, B. Li and H. Li, "Public Auditing for Shared Data with Efficient User Revocation in the Cloud," in Proc. of IEEE INFOCOM 2013, pp. 2904-2912, 2013. Article (CrossRef Link) |
25 | B. Wang, H. Li and M. Li, "Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics," in Proc. of Communications (ICC), 2013 IEEE International Conference on IEEE, pp. 1946-1950, June 9-13, 2013.Article (CrossRef Link) |
26 | J. Yuan and S. Yu, "Efficient Public Integrity Checking for Cloud Data Sharing with Multi-user Modification," in Proc. of IEEE INFOCOM 2014, pp. 2121-2129, April 27-May 2, 2014. Article (CrossRef Link) |
27 | B. Wang, B. Li and H. Li, "Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud," in Proc. of IEEE Cloud 2012, pp. 295-302, June 24-29, 2012. Article (CrossRef Link) |
![]() |