Secure data stream outsourcing with publicly verifiable integrity in cloud storage

Journal of Information Security and Applications - Tập 49 - Trang 102392 - 2019
Qiyu Wu1, Fucai Zhou1, Jian Xu1,2,3, Qiang Wang1
1Software College, Northeastern University, Shenyang 110169, China
2State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
3Department of Electrical and Computer Engineering, Iowa State University, Iowa 50011, USA

Tài liệu tham khảo

Gubbi, 2013, Internet of things (iot): a vision, architectural elements, and future directions, Future Gen Comput Syst, 29, 1645, 10.1016/j.future.2013.01.010 Kolozali, 2014, A knowledge-based approach for real-time iot data stream annotation and processing, 215 Ma, 2012, An efficient index for massive iot data in cloud environment, 2129 Narasimha, 2006, Authentication of outsourced databases using signature aggregation and chaining, 420 Zhang, 2015, Integridb: verifiable sql for outsourced databases, 1480 Xu, 2018, Dynamic proofs of retrievability based on partitioning-based square root oblivious ram, Comput Mater Continua, 57, 589, 10.32604/cmc.2018.03820 Feng, 2011, Study on cloud computing security, J softw, 22, 71, 10.3724/SP.J.1001.2011.03958 Wang, 2013, Privacy-preserving public auditing for secure cloud storage, IEEE Trans Comput, 62, 362, 10.1109/TC.2011.245 Wu, 2018, A distributed intrusion detection model via nondestructive partitioning and balanced allocation for big data, Comput Mater Continua, 56, 61 Schröder, 2012, Verifiable data streaming, 953 Schöder, 2015, Veristream–a framework for verifiable data streaming, 548 Krupp, 2016, Nearly optimal verifiable data streaming, 417 Xu, 2017, Dynamic chameleon authentication tree for verifiable data streaming in 5g networks, IEEE Access, 5, 26448, 10.1109/ACCESS.2017.2771281 Naor, 2000, Certificate revocation and certificate update, IEEE J Sel Areas Commun, 18, 561, 10.1109/49.839932 Li, 2006, Dynamic authenticated index structures for outsourced databases, 121 Mykletun, 2006, Authentication and integrity in outsourced databases, ACM Trans Storage (TOS), 2, 107, 10.1145/1149976.1149977 Martel, 2004, A general model for authenticated data structures, Algorithmica, 39, 21, 10.1007/s00453-003-1076-8 Tamassia, 2010, Certification and authentication of data structures Papamanthou, 2007, Time and space efficient algorithms for two-party authenticated data structures, 1 Xu, 2018, Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures, J Netw Comput Appl, 107, 113, 10.1016/j.jnca.2018.01.014 Merkle, 1989, A certified digital signature, 218 Wang, 2015, Verifiable auditing for outsourced database in cloud computing, IEEE Trans Comput, 64, 3293, 10.1109/TC.2015.2401036 Liu, 2018, Verifiable diversity ranking search over encrypted outsourced data, Comput Mater Continua, 55, 37, 10.1016/j.commatsci.2018.07.031 Camenisch, 2002, Dynamic accumulators and application to efficient revocation of anonymous credentials, 61 Nguyen, 2005, Accumulators from bilinear pairings and applications, 275 Camenisch, 2009, An accumulator based on bilinear maps and efficient revocation for anonymous credentials, 481 Benabbas, 2011, Verifiable delegation of computation over large datasets, 111 Catalano, 2013, Vector commitments and their applications, 55 Miao, 2017, Publicly verifiable databases with efficient insertion/deletion operations, J Comput Syst Sci, 86, 49, 10.1016/j.jcss.2016.07.005 Papamanthou, 2013, Streaming authenticated data structures, 353 Stefanov, 2012, Iris: a scalable cloud file system with efficient integrity checks, 229 Yi, 2017, Dynamic authenticated method for outsourcing data stream with access control in cloud, Chin J Comput, 2, 337 Boneh, 2001, Identity-based encryption from the weil pairing, 213 Krawczyk, 2000, Chameleon signatures