CRUPA: collusion resistant user revocable public auditing of shared data in cloud
Tóm tắt
Từ khóa
Tài liệu tham khảo
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable Data Possession at Untrusted Stores In: Proceedings of the 14th ACM Conference on Computer and Communications Security, 598–609. https://doi.org/10.1145/1315245.1315318.
Ateniese G, Di Pietro R, Mancini LV, Tsudik G (2008) Scalable and Efficient Provable Data Possession In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, 1–9.. ACM. https://doi.org/10.1145/1460877.1460889.
Ateniese G, Hohenberger S (2005) Proxy Re-signatures: New Definitions, Algorithms, and Applications. Proc 12th ACM Conf Comput Commun Secur:310–319.
Blaze M, Bleumer G, Strauss M (1998) Divertible Protocols and Atomic Proxy Cryptography. Int Conf Theory Appl Cryptographic Tech:127–144. https://doi.org/10.1007/bfb0054122.
Boneh D, Gentry C, Lynn B, Shacham H (2003) Aggregate and Verifiably Encrypted Signatures from Bilinear Maps:416–432. https://doi.org/10.1007/3-540-39200-9_26.
Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility. Futur Gener Comput Syst 25(6):599–616.
Chen F, Xiang T, Lei X, Chen J (2014) Highly Efficient Linear Regression Outsourcing to a Cloud. IEEE Trans Cloud Comput 2(4):499–508.
Dong X, Yu J, Luo Y, Chen Y, Xue G, Li M (2014) Achieving an Effective, Scalable and Privacy-Preserving Data Sharing Service in Cloud Computing. Comput Secur 42:151–164.
Dong X, Yu J, Zhu Y, Chen Y, Luo Y, Li M (2015) SECO: Secure and Scalable Data Collaboration Services in Cloud Computing. Comput Secur 50:91–105.
Erway CC, Küpçü A, Papamanthou C, Tamassia R (2015) Dynamic Provable Data Possession. ACM Trans Inf Syst Secur (TISSEC) 17(4):213–222.
Garg N, Bawa S (2016) Comparative Analysis of Cloud Data Integrity Auditing Protocols. J Netw Comput Appl 66:17–32.
Geeta CM, Raghavendra S, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2018) Data Auditing and Security in Cloud Computing: Issues, Challenges and Future Directions. Int J Comput (IJC) 28(1):8–57.
Hall R, Fienberg SE, Nardi Y (2011) Secure Multiple Linear Regression based on Homomorphic Encryption. J Off Stat 27(4):669.
Hwang JY, Chen L, Cho HS, Nyang D (2015) Short Dynamic Group Signature Scheme Supporting Controllable Linkability. IEEE Trans Inf Forensic Secur 10(6):1109–1124.
Jin H, Jiang H, Zhou K (2018) Dynamic and Public Auditing with Fair Arbitration for Cloud Data. IEEE Trans Cloud Comput 6(3):680–693.
Li J, Yan H, Zhang Y (2018) Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage. IEEE Trans Serv Comput. https://doi.org/10.1109/tsc.2018.2789893.
Li J, Yao W, Han J, Zhang Y, Shen J (2017) User Collusion Avoidance CP-ABE with Efficient Attribute Revocation for Cloud Storage. IEEE Syst J 12(2):1767–1777.
Liu F, Tong J, Mao J, Bohn R, Messina J, Badger L, Leaf D (2011) NIST Cloud Computing Reference Architecture. NIST Spec Publ 500(2011):1–28.
Luo Y, Xu M, Fu S, Wang D, Deng J (2015) Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation In: Trustcom/BigDataSE/ISPA, IEEE, vol. 1, 434–442. https://doi.org/10.1109/trustcom.2015.404.
Pairing Based Cryptography (PBC) Library. http://crypto.stanford.edu/pbc/,2014...
Pattar S, Buyya R, Venugopal KR, Iyengar S, Patnaik L (2018) Searching for the IoT Resources: Fundamentals, Requirements, Comprehensive Review, and Future Directions. IEEE Commun Surv Tutor 20(3):2101–2132.
Raghavendra S, Doddabasappa PA, Geeta CM, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2016) Secure Multi-Keyword Search and Multi-User Access Control over an Encrypted Cloud Data. Int J Inf Process 10(2):51–61.
Raghavendra S, Geeta CM, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2015) MSIGT: Most Significant Index Generation Technique for Cloud Environment In: Proceedings of the Annual IEEE India Conference (INDICON), 1–6. https://doi.org/10.1109/indicon.2015.7443531.
Ren K, Wang C, Wang Q (2012) Security Challenges for the Public Cloud. IEEE Internet Comput 16(1):69–73.
Shen J, Shen J, Chen X, Huang X, Susilo W (2017) An Efficient Public Auditing Protocol with Novel Dynamic Structure for Cloud Data. IEEE Trans Inf Forensic Secur 12(10):2402–2415.
Shen W, Qin J, Yu J, Hao R, Hu J (2019) Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage. IEEE Trans Inf Forensic Secur 14(2):331–346.
Tarannum S, Aravinda B, Nalini L, Venugopal KR, Patnaik LM (2006) Routing Protocol for Lifetime Maximization of Wireless Sensor Networks In: International Conference on Advanced Computing and Communications, 401–406.. IEEE. https://doi.org/10.1109/adcom.2006.4289925.
Tate SR, Vishwanathan R, Everhart L (2013) Multi-User Dynamic Proofs of Data Possession using Trusted Hardware In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 353–364. https://doi.org/10.1145/2435349.2435400.
Tian H, Chen Y, Chang CC, Jiang H, Huang Y, Chen Y, Liu J (2017) Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage. IEEE Trans Serv Comput 10(5):701–714.
Tian H, Nan F, Jiang H, Chang CC, Ning J, Huang Y (2019) Public Auditing for Shared Cloud Data with Efficient and Secure Group Management. Inf Sci 472:107–125.
Tian JF, Guo RF, Jing X (2019) Stern-Brocot-based Non-Repudiation Dynamic Provable Data Possession. IEEE Access. https://doi.org/10.1109/access.2019.2916173.
Venugopal KR, Buyya R (2013) Mastering C++. McGraw-Hill Education, New Delhi.
Venugopal KR, Rajan EE, Kumar PS (1998) Performance Analysis of Wavelength Converters in WDM Wavelength Routed Optical Networks In: Proceedings. Fifth International Conference on High Performance Computing (Cat. No. 98EX238), 239–246.. IEEE. https://doi.org/10.1109/hipc.1998.737994.
Venugopal KR, Rajan EE, Kumar PS (1999) Impact of Wavelength Converters in Wavelength Routed All-Optical Networks. Comput Commun 22(3):244–257.
Venugopal KR, Srinivasa KG, Patnaik LM (2009) Soft Computing for Data Mining Applications. Springer. https://doi.org/10.1007/978-3-642-00193-2.
Wang B, Li B, Li H (2012) Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud. Int Conf Appl Crypt Netw Secur:507–525. https://doi.org/10.1007/978-3-642-31284-7_30.
Wang B, Li B, Li H (2014) Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud. IEEE Trans Cloud Comput 2(1):43–56.
Wang B, Li B, Li H (2015) Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud. IEEE Trans Serv Comput 8(1):92–106.
Wu TY, Tseng YM, Huang SS, Lai YC (2017) Non-Repudiable Provable Data Possession Scheme with Designated Verifier in Cloud Storage Systems. IEEE Access 5:19333–19341.
Xu X, Zhou J, Wang X, Zhang Y (2016) Multi-Authority Proxy Re-encryption Based on CPABE for Cloud Storage Systems. J Syst Eng Electron 27(1):211–223.
Yan H, Li J, Han J, Zhang Y (2016) A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage. IEEE Trans Inf Forensic Secur 12(1):78–88.
Yan H, Li J, Zhang Y (2019) Remote Data Checking with a Designated Verifier in Cloud Storage. IEEE Syst J. https://doi.org/10.1109/jsyst.2019.2918022.
Yang G, Yu J, Shen W, Su Q, Fu Z, Hao R (2016) Enabling Public Auditing for Shared Data in Cloud Storage Supporting Identity Privacy and Traceability. J Syst Softw 113:130–139.
Yu Y, Ni J, Xia Q, Wang X, Yang H, Zhang X (2016) SDIVIP2: Shared Data Integrity Verification with Identity Privacy Preserving in Mobile Clouds. Concurr Comput Pract Experience 28(10):2877–2888.
Yuan J, Yu S (2015) Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification. IEEE Trans Inf Forensic Secur 10(8):1717–1726.
Zhu Y, Wang H, Hu Z, Ahn GJ, Hu H, Yau SS (2011) Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds In: Proceedings of the 2011 ACM Symposium on Applied Computing, 1550–1557. https://doi.org/10.1145/1982185.1982514.