4.7 Article

A Lightweight Auditing Service for Shared Data with Secure User Revocation in Cloud Storage

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree

Lu Rao et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)

Article Computer Science, Hardware & Architecture

Comments on a lightweight cloud auditing scheme: Security analysis and improvement

Reyhaneh Rabaninejad et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Theory & Methods

Dynamic Proofs of Retrievability Via Oblivious RAM

David Cash et al.

JOURNAL OF CRYPTOLOGY (2017)

Article Computer Science, Theory & Methods

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage

Yong Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

Online/Offline Provable Data Possession

Yujue Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage

Hao Yan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data

Jian Shen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage

Hui Tian et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)

Article Computer Science, Software Engineering

SDIVIP2: shared data integrity verification with identity privacy preserving in mobile clouds

Yong Yu et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2016)

Article Computer Science, Hardware & Architecture

Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation

Tao Jiang et al.

IEEE TRANSACTIONS ON COMPUTERS (2016)

Editorial Material Computer Science, Theory & Methods

Comments on Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification

Yong Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Theory & Methods

Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud

Jiangtao Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Software Engineering

Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability

Guangyang Yang et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2016)

Article Computer Science, Information Systems

Dynamic Provable Data Possession

C. Chris Erway et al.

ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2015)

Article Computer Science, Theory & Methods

Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification

Jiawei Yuan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Editorial Material Computer Science, Information Systems

Comments on a Public Auditing Mechanism for Shared Cloud Data Service

Yong Yu et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)

Article Computer Science, Information Systems

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Boyang Wang et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)

Article Computer Science, Information Systems

Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

Boyang Wang et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2014)

Article Computer Science, Information Systems

Proxy Provable Data Possession in Public Clouds

Huaqun Wang

IEEE TRANSACTIONS ON SERVICES COMPUTING (2013)

Article Computer Science, Information Systems

Dynamic Audit Services for Outsourced Storages in Clouds

Yan Zhu et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2013)