1 |
K. Yang, X. Jia, "An efficient and secure dynamic auditing protocol for data storage in cloud computing,"IEEE Transactions on Parallel and Distributed Systems, 24(9), 1717-1726, 2013.
DOI
|
2 |
R. Curtmola, O. Khan, R. Burns, G. Ateniese, "MR-PDP: Multiple-replica provable data possession," In Proceedings of ICDCS 2008, pp. 411-420 (2008).
|
3 |
B. Wang, B. Li, H. Li, "Panda: public auditing for shared data with efficient user revocation in the cloud," IEEE Transactions on Services Computing, 8(1), 92-106, 2015.
DOI
|
4 |
Q. Wang, C. Wang, K. Ren, W. Lou, J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Transactions on Parallel and Distributed Systems, 22(5), 847-859, 2011.
DOI
|
5 |
C. Erway, A. Kupcu, C. Papamanthou, R. Tamassia, "Dynamic Provable Data Possession," ACM Transactions on Information and System Security, 17(4), 2015.
|
6 |
C. Liu, R. Ranjan, C. Yang, X. Zhang, L. Wang, J. Chen, "MuRDPA: Top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud," IEEE Transactions. on Computers, 64(9), 2609-2622, 2015.
DOI
|
7 |
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, "Provable Data Possession at Untrusted Stores," in Proc. of ACM CCS 2007, pp. 598-609, 2007.
|
8 |
A. F. Barsoum, M. A. Hasan, "Provable multicopy dynamic data possession in cloud computing systems," IEEE Transactions on Information Forensics and Security, 10(3), pp. 485-497, 2015.
DOI
|
9 |
J. Wang, X. Chen, X. Huang, I. You, and Y. Xiang, "Verifiable auditing for outsourced database in cloud computing," IEEE Transactions on Computers, 64(11), 3293-3303, 2015.
DOI
|
10 |
Y. Miao, J. Ma, X. Liu, X. Li, Q. Jiang, and J. Zhang, "Attribute-based keyword search over hierarchical data in cloud computing," IEEE Transactions on Services Computing, 2018.
|
11 |
Y. Miao, J. Ma, X. Liu, X. Li, Z. Liu, and H. Li, "Practical attribute based multi-keyword search scheme in mobile crowdsourcing," IEEE Internet of Things Journal, 5 (4), 3008-3018, 2018.
DOI
|
12 |
Y. Miao, J. Ma, X. Liu, J. Weng, and H. Li, H Li, "Lightweight fine-grained search over encrypted data in fog computing," IEEE Transactions on Services Computing, 2018.
|
13 |
Y. Miao, J. Weng, X. Liu, KKR Choo, Z. Liu, and H. Li, "Enabling verifiable multiple keywords search over encrypted cloud data," Information Sciences, 465, 21-37, 2018.
DOI
|
14 |
J. Zhao, C. Xu, F. Li, W. Zhang, "Identity-based public verification with privacy preserving for data storage security in cloud computing," IEICE Transactions Fundamentals Electronics, Communications and Computer Sciences, 96(12), 2709-2716, 2013.
|
15 |
D. Boneh, M. Franklin, "Identity-based encryption from the weil pairing, " in Proc. of CRYPTO 2001, LNCS 2139, pp. 213-229, 2001.
|
16 |
H. Wang, "Identity-based distributed provable data possession in multicloud storage," IEEE Transactions on Services Computing, 8(2), 328-340, 2015.
DOI
|
17 |
H. Wang, D. He, S. Tang, "Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud," IEEE Transactions on Information Forensics and Security, 11(6), 1165-1176, 2016.
DOI
|
18 |
Y. Yu, Y. Zhang, Y. Mu, W. Susilo, "Provably Secure Identity based Provable Data Possession," in Proc. of ProvSec 2015, LNCS 9451, pp. 1-16, Springer, Heidelberg, 2015.
|
19 |
H. Liu, Y. Mu, J. Zhao, C. Xu, H. Wang, L. Chen, et al., "Identity-based provable data possession revisited: security analysis and generic construction," Computer Standards & Interfaces, 54(1), 10-19, 2017.
DOI
|
20 |
Y. Yu, M. H. A. Au, G. Ateniese, X. Huang, W. Susilo, Y. Dai, G. Min , "Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage," IEEE Transactions on Information Forensics and Security, 12(4), 767-778, April, 2017.
DOI
|
21 |
X. Zhang, H. Wang and C. Xu, "Identity-based key-exposure resilient cloud storage public auditing scheme from lattices," Information Science, 472, 223-234, 2019.
DOI
|
22 |
S. Peng, F. Zhou, J. Xu, Z. Xu, "Comments on "Identity-Based Distributed Provable Data Possession in Multicloud Storage," IEEE Transactions on Services Computing, 9(6), 996-998, Nov.-Dec, 2016.
DOI
|
23 |
J. Zhao, C. Xu and K. Chen, "A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage," KSII Transactions on Internet and Information Systems, 12(9), 4576-4598, 2018.
DOI
|
24 |
The GNU Multiple Precision Arithmetic Library (GMP).
|
25 |
J. Coron, "On the exact security of full domain hash," In Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 220-235. Springer, Heidelberg (2000).
|
26 |
H. Yu, Y. Cai, S. Kong, et al, "Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy," KSII transactions on Internet and Information Systems, 11(10), Oct. 5039-5061, 2017.
DOI
|
27 |
The Pairing-Based Cryptography Library (PBC).
|
28 |
OpenSSL: cryptography and SSL/TLS Toolkit.
|
29 |
IDC.com, "Worldwide Public Cloud Services Spending Forecast to Reach $122.5 Billion in 2017, According to IDC," February 20, 2017.
|
30 |
Gartner.com, "Gartner Forecasts Worldwide Public Cloud Services Revenue to Reach $260 Billion in 2017," October 12, 2017.
|
31 |
Y. Wang, Q. Wu, B. Qin, W. Shi, R. H. Deng, J. Hu, "Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds, " IEEE Transactions on Information Forensics and Security,12(4), 940-952, 2017.
DOI
|
32 |
Z. Fu, X. Wu, C. Guan, X. Sun, K. Ren, "Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement," IEEE Transactions on Information Forensics and Security, 11(12), 2706-2716, 2016.
DOI
|
33 |
Y. Zhu, H. Hu, G. J. Ahn, M.Yu, "Cooperative Provable Data Possession for Integrity Verification in MultiCloud Storage," IEEE Transactions Parallel and Distributed Systems, 23(12), 2231-2244, December, 2012.
DOI
|
34 |
H. Shacham, B. Waters, "Compact proofs of retrievability," In Proceedings of ASIACRYPT 2008, pp. 90-107, 2008.
|
35 |
C. Wang, S. S. M. Chow, Q. Wang, K. Ren, W. Lou, "Privacy-Preserving Public Auditing for Secure Cloud Storage," IEEE Transactions on Computers, 62(2), 362-375, February, 2013.
DOI
|