A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding

IEEE Transactions on Parallel and Distributed Systems - Tập 23 Số 6 - Trang 995-1003 - 2012
Hsiao-Ying Lin1, Wen-Guey Tzeng1
1Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan

Tóm tắt

Từ khóa


Tài liệu tham khảo

bhagwan, 2004, Total Recall: System Support for Automated Availability Management, Proc First Symp Networked Systems Design and Implementation (NSDI), 337

rhea, 2003, Pond: The Oceanstore Prototype, Proc Second USENIX Conf File and Storage Technologies (FAST), 1

blaze, 1998, Divertible Protocols and Atomic Proxy Cryptography, Proc Int'l Conf Theory and Application of Cryptographic Techniques (EUROCRYPT), 127

mambo, 1997, Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts, IEICE Trans Fundamentals of Electronics Comm and Computer Sciences, 80, 54

10.1109/TIT.2006.874535

10.1109/IPSN.2005.1440909

shao, 2009, CCA-Secure Proxy Re-Encryption without Pairings, Proc 12th Int'l Conf Practice and Theory in Public Key Cryptography (PKC), 357

ateniese, 2009, Key-Private Proxy Re-Encryption, Proc Topics in Cryptology (CT-RSA), 279

tang, 2008, Type-Based Proxy Re-Encryption and Its Construction, Proc Ninth Int'l Conf Cryptology in India Progress in Cryptology (INDOCRYPT), 130

10.1145/1127345.1127346

kallahalla, 2003, Plutus: Scalable Secure File Sharing on Untrusted Storage, Proc Second USENIX Conf File and Storage Technologies (FAST), 29

sandberg, 1985, Design and Implementation of the Sun Network Filesystem, Proc USENIX Assoc Conf

10.1002/spe.4380121206

10.1109/TPDS.2010.27

10.1145/1456469.1456474

haeberlen, 2005, Glacier: Highly Durable, Decentralized Storage Despite Massive Correlated Failures, Proc Second Symp Networked Systems Design and Implementation (NSDI), 143

10.1145/1060289.1060291

10.1145/1653662.1653686

ateniese, 2009, Proofs of Storage from Homomorphic Identification Protocols, Proc 15th Int'l Conf Theory and Application of Cryptology and Information Security (ASIACRYPT), 319

10.1145/359168.359176

10.1109/INFCOM.2010.5462173

10.1145/1315245.1315318

10.1145/378993.379239

shacham, 2008, Compact Proofs of Retrievability, Proc 14th Int'l Conf Theory and Application of Cryptology and Information Security (ASIACRYPT), 90

10.1109/HOTOS.2001.990064

10.1145/1460877.1460889

ungureanu, 2010, Hydrafs: A High-Throughput File System for the Hydrastor Content-Addressable Storage System, Proc Eighth USENIX Conf File and Storage Technologies (FAST), 17

dubnicki, 2009, Hydrastor: A Scalable Secondary Storage, Proc Seventh Conf File and Storage Technologies (FAST), 197

dong, 2011, Tradeoffs in Scalable Data Routing for Deduplication Clusters, Proc Ninth USENIX Conf File and Storage Technologies (FAST), 2