1 |
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," Proceedings of ACM CCS'07, pp. 598-609, 2007.
|
2 |
G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, "Scalable and efficient provable data possession," Proceedings of the 4th international conference on Security and privacy in communication networks, pp. 1-10, 2008.
|
3 |
D. Boneh, B. Lynn, and H. Shacham, "Short Signatures from The Weil Pairing," Journal of Cryptology, vol. 17, no. 4, pp. 297-319, Sept. 2004.
DOI
|
4 |
C.M. Chen, Y.H. Lin, Y.C. Lin, H.M. Sun, "RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks," IEEE Trans. on Parallel and Distributed Systems, vol. 23, no. 4, pp. 727-734, April 2012.
DOI
|
5 |
A. Juels, S. Burton, and J. Kaliski, "PORs: Proofs of Retrievability for Large Files," Proceedings of ACM CCS'07, pp. 584-597, 2007.
|
6 |
H. Kai, H. Chuanhe, W. Jinhai, Z. Hao, C. Xi, L. Yilong, Z. Lianzhen, and W. Bin, "An Efficient Public Batch Auditing Protocol for Data Security in Multi-Cloud Storage," Proceedings of the 8th China Grid Annual Conference, pp. 51-56, 2013.
|
7 |
Sooyeon Shin, Kunhee Lee, and Taekyoung Kwon, "A Study on Privacy-Preserving Batch Auditing for Multiuser and Multicloud," CISC-S'14, 2014.
|
8 |
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security on Cloud Computing," Proceedings of IEEE INFOCOM, pp. 1-9, 2010.
|
9 |
C. Wang, Sherman S.-M. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Secure Cloud Computing," IEEE Trans. on Computers, vol. 62, issue 2, pp. 362-375, Feb. 2013.
DOI
ScienceOn
|
10 |
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing," Proc. of ESORICS'09, LNCS 5789. pp. 355-370, 2009.
|
11 |
C. Xu, X. He, and D. Abraha-Weldemariam, "Cryptoanalysis of Wang's Auditing Protocol for Data Storage Security in Cloud Computing," Proc. of ICICA'12, Part II, CCIS 308, pp. 422-428, 2012.
|
12 |
K. Yang and X. Jia, "An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing," IEEE Trans. on Parallel and Distributed Systems, vol. 24, no. 9, pp. 1717-1726, Sept. 2013.
DOI
ScienceOn
|
13 |
Y. Zhu, H. Hu, G. Ahn, and M. Yu, "Cooperative Provable Data Possession for Integrity Verification in Multicloud storage," IEEE Trans. on Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231-2244, Dec. 2012.
DOI
|
14 |
The openssl project, 2014. Available: https://www.openssl.org/source/
|
15 |
The pairing-based cryptography library (pbc), 2014. Available: http://crypto.stanford.edu/pbc/
|