Security and privacy for storage and computation in cloud computing
Tài liệu tham khảo
Armbrust, 2010, A view of cloud computing, Communications of the ACM, 53, 50, 10.1145/1721654.1721672
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, Provable data possession at untrusted stores, in: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS’07), Alexandria, Virginia, USA, October 28–31, 2007.
G. Ateniese, R. Di Pietro, L. Mancini, G. Tsudik, Scalable and efficient provable data possession, in: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, Istanbul, Turkey, September 22–26, 2008.
M. Belenkiy, M. Chase, C. Erway, J. Jannotti, A. Küpçü, A. Lysyanskaya, Incentivizing outsourced computation, in: Proceedings of the 3rd International Workshop on Economics of Networked Systems, Seattle, WA, USA, August 17–22, 2008.
A. Bialecki, M. Cafarella, D. Cutting, O. OMalley, Hadoop: A Framework for Running Applications on Large Clusters Built of Commodity Hardware. <http://lucene.apache.org/hadoop>.
Boneh, 2003, Identity-based encryption from the Weil pairing, SIAM Journal on Computing, 32, 586, 10.1137/S0097539701398521
D. Boneh, C. Gentry, B. Lynn, H. Shacham, Aggregate and verifiably encrypted signatures from bilinear maps, in: International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2003), Warsaw, Poland, May 4–8, 2003.
Boneh, 2004, Short signatures from the Weil pairing, Journal of Cryptology, 17, 297, 10.1007/s00145-004-0314-9
R. Canetti, B. Riva, G. Rothblum, Verifiable computation with two or more clouds, in: Workshop on Cryptography and Security in Clouds, Zurich, Switzerland, March 15–16, 2011.
A.D. Caro, jPBC-Java Pairing-based Cryptography Library (Technique Report). <http://gas.dia.unisa.it/projects/jpbc/> (28.12.10).
Castro, 2002, Practical byzantine fault tolerance and proactive recovery, ACM Transaction on Computer Systems, 20, 398, 10.1145/571637.571640
Dean, 2008, MapReduce: simplified data processing on large clusters, Communications of The ACM, 51, 107, 10.1145/1327452.1327492
W. Du, J. Jia, M. Mangal, M. Murugesan, Uncheatable grid computing, in: Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS’04), Hachioji, Tokyo, Japan, March 24–26, 2004.
Duan, 2012, A survey on service-oriented network virtualization toward convergence of networking and cloud computing, IEEE Transactions on Network and Service Management, 9, 373, 10.1109/TNSM.2012.113012.120310
C. Erway, A. Kupcu, C. Papamanthou, R. Tamassia, Dynamic provable data possession, in: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS’09), Chicago, Illinois, USA, November 9–13, 2009.
R. Gennaro, C. Gentry, B. Parno, Non-interactive verifiable computing: Outsourcing computation to untrusted workers, in: 30th International Cryptology Conference (CYPTO 2010), Santa Barbara, California, USA, August 15–19, 2010.
P. Golle, I. Mironov, Uncheatable distributed computations, in: The Cryptographers’ Track at RSA Conference 2001, San Francisco, CA, USA, April 8–12, 2001.
A. Haeberlen, A case for the accountable cloud, in: 3rd ACM SIGOPS International Workshop on Large Scale Distributed Systems and Middleware, Big Sky Resort, Big Sky, MT, October 10–11, 2009.
Huang, 2011, Efficient strong designated verifier signature schemes without random oracle or with non-delegatability, International Journal of Information Security, 10, 373, 10.1007/s10207-011-0146-1
W. Itani, A.I. Kayssi, A. Chehab, Privacy as a service: privacy-aware data storage and processing in cloud computing architectures, in: Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2009), Chengdu, China, December 12–14, 2009.
M. Jakobsson, K. Sako, R. Impagliazzo, Designated verifier proofs and their applications, in: International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT 1996), Zaragoza, Spain, May 12–16, 1996.
A. Juels, B. Kaliski Jr., PORs: proofs of retrievability for large files, in: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS’07), Alexandria, Virginia, USA, October 28–31, 2007.
Kang, 2009, A novel identity-based strong designated verifier signature scheme, Journal of Systems and Software, 82, 270, 10.1016/j.jss.2008.06.014
G. Karame, M. Strasser, S. Capkun, Secure remote execution of sequential computations, in: 11th International Conference on Information and Communications Security (ICICS’09), Beijing, China, December 14–17, 2009.
A. Marinos, G. Briscoe, Community cloud computing, in: Proceedings of Cloud Computing: First International Conference (CloudCom 2009), Beijing, China, December 1–4, 2009.
R. Merkle, Protocols for public key cryptosystems, in: IEEE Symposium on Security and Privacy, Oakland, California, USA, April, 1980.
F. Monrose, P. Wyckoff, A. Rubin, Distributed execution with remote audit, in: Proceedings of the Network and Distributed Systems Security Symposium (NDSS), San Diego, California, USA, 1999.
P. Patel, A. Ranabahu, A. Sheth, Service level agreement in cloud computing, in: Cloud Workshops at OOPSLA09, Orlando, Florida, USA, October 25–29, 2009.
S. Pearson, Y. Shen, M. Mowbray, A privacy manager for cloud computing, in: First International Conference (CloudCom 2009), Beijing, China, December 1–4, 2009.
A. Sadeghi, T. Schneider, M. Winandy, Token-based cloud computing: Secure outsourcing of data and arbitrary computations with lower latency, in: Trust and Trustworthy Computing, Berlin, Germany, June 21–23, 2010.
Takabi, 2010, Security and privacy challenges in cloud computing environments, IEEE Security & Privacy, 8, 24, 10.1109/MSP.2010.186
C. Wang, K. Ren, J. Wang, Secure and practical outsourcing of linear programming in cloud computing, in: 30th IEEE Conference on Computer Communications (INFOCOM 2011), Shanghai, China, April 11–15, 2011.
C. Wang, Q. Wang, K. Ren, W. Lou, Privacy-preserving public auditing for data storage security in cloud computing, in: 29th IEEE Conference on Computer Communications (INFOCOM’10), San Diego, California, USA, March 14–19, 2010.
Q. Wang, C. Wang, J. Li, K. Ren, W. Lou, Enabling public verifiability and data dynamics for storage security in cloud computing, in: 14th European Symposium on Research in Computer Security (ESORICS’09), Saint Malo, France, September 21–23, 2009.
L. Wei, H. Zhu, Z. Cao, W. Jia, A. Vasilakos, Seccloud: bridging secure storage and computation in cloud, in: 30th International Conference on Distributed Computing Systems Workshops (IEEE ICDCSW 2010), Genova, Italy, June 21–25, 2010.
Yuen, 2010, How to construct identity-based signatures without the key escrow problem, International Journal of Information Security, 9, 297, 10.1007/s10207-010-0110-5
Zhang, 2008, A novel ID-based designated verifier signature scheme, Information Sciences, 178, 766, 10.1016/j.ins.2007.07.005