Data possession audit with an implicit trusted third-party for cloud storage

被引:0
|
作者
National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China [1 ]
不详 [2 ]
机构
来源
Harbin Gongcheng Daxue Xuebao | 2012年 / 8卷 / 1039-1045期
关键词
D O I
10.3969/j.issn.1006-7043.201112068
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] A trusted evidence collection method based on the trusted third-party for cloud platform
    Wu L.
    Zhan J.
    Zhao Y.
    Hu J.
    Li M.
    Int. J. Simul. Syst. Sci. Technol., 25
  • [2] Provable cloud data possession scheme via third-party proxy dynamic operations
    Zhao Y.
    Ren H.-Q.
    Xiong H.
    Chen Y.
    1600, Univ. of Electronic Science and Technology of China (45): : 796 - 801
  • [3] A Trusted Third-Party (TTP) based Encryption Scheme for Ensuring Data Confidentiality in Cloud Environment
    Rizvi, Syed
    Cover, Katie
    Gates, Christopher
    COMPLEX ADAPTIVE SYSTEMS, 2014, 36 : 381 - 386
  • [4] Trusted Third Party for Data Security in Cloud Environment
    Katre, Noopur
    Theng, Deepti
    PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 670 - 672
  • [5] Cloud Storage Retrievability Based On Third Party Audit
    Qin, Zhongyuan
    Song, Yunyan
    Zhang, Qunfang
    Huang, Jie
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 303 - 307
  • [6] Scheme for Ensuring Data Security on Cloud Data Storage in a Semi-trusted Third Party Auditor
    Hussien, Zaid Alaa
    Jin, Hai
    Abduljabbar, Zaid Ameen
    Hussain, Mohammed Abdulridha
    Abbdal, Salah H.
    Zou, Deqing
    PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 1200 - 1203
  • [7] Cloud Storage Third-party Data Security Scheme Based on Fully Homomorphic Encryption
    Chen, Junjian
    2016 INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC), 2016, : 155 - 159
  • [8] Effective Privacy Preservation in Third-Party Cloud Storage Auditing
    Chuang, Po-Jen
    Chuang, Han-Chun
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2019, 35 (01) : 125 - 135
  • [9] A Practical Third-Party Auditor Prototype for Cloud Storage Service
    Yeh, Lo-Yao
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 796 - 799
  • [10] How to prepare for a third-party audit
    Tomlin, S
    Penniman, L
    JOURNAL OF FORESTRY, 2003, 101 (08) : 4 - 4