[1]
|
Kamara, Seny, and Kristin Lauter. "Cryptographic cloud sto-rage." Financial Cryptography and Data Security (2010): 136-149.
|
[2]
|
Ullah, Sultan, and Xuefeng Zheng. "Cloud Computing Research Challenges." In Biomedical Enginnering and Informatics, 2012. BMEI12. fifth International Conference on, pp. 1397-1401. IEEE, 2012.
|
[3]
|
Ullah, Sultan, Zheng Xuefeng, Zhou Feng, and Zhao Haichun. "Tcloud: Challenges And Best Practices For Cloud Computing." International Journal of Engineering 1, no. 9 (2012).
|
[4]
|
Kaufman, Lori M. "Data security in the world of cloud computing." Security & Privacy, IEEE 7, no. 4 (2009): 61-64.
|
[5]
|
Mykletun, Einar, Maithili Narasimha, and Gene Tsudik. "Authentication and integrity in outsourced databases." ACM Transactions on Sto-rage (TOS) 2, no. 2 (2006): 107-138.
|
[6]
|
Shacham, Hovav, and Brent Waters. "Compact proofs of retrievability." Advances in Cryptology-ASIACRYPT 2008 (2008): 90-107.
|
[7]
|
Ateniese, Giuseppe, Roberto Di Pietro, Luigi V. Mancini, and Gene Tsudik. "Scalable and efficient provable data possession." In Proceedings of the 4th international conference on Security and privacy in communication netowrks, p. 9. ACM, 2008.
|
[8]
|
Wang, Qian, Cong Wang, Jin Li, Kui Ren, and Wenjing Lou. "Enabling public verifiability and data dynamics for storage security in cloud computing." Computer Securi-ty–ESORICS 2009 (2009): 355-370.
|
[9]
|
Hao, Zhuo, and Nenghai Yu. "A multiple-replica remote data possession checking protocol with public verifiability." In Data, Privacy and E-Commerce (ISDPE), 2010 Second International Symposium on, pp. 84-89. IEEE, 2010.
|
[10]
|
Ateniese, Giuseppe, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. "Provable data possession at untrusted stores." In Proceedings of the 14th ACM conference on Computer and communications security, pp. 598-609. ACM, 2007.
|
[11]
|
Juels, Ari, and Burton S. Kaliski Jr. "PORs: Proofs of retrievability for large files." In Proceedings of the 14th ACM conference on Computer and communications security, pp. 584-597. ACM, 2007.
|
[12]
|
Sebé, Francesc, Josep Domingo-Ferrer, Antoni Martinez-Balleste, Yves Deswarte, and J-J. Quisquater. "Efficient remote data possession checking in critical information infrastructures." Knowledge and Data Engineering, IEEE Transactions on 20, no. 8 (2008): 1034-1038.
|
[13]
|
Erway, Chris, Alptekin Küp?ü, Charalampos Papamanthou, and Roberto Tamassia. "Dynamic provable data possession." In Proceedings of the 16th ACM conference on Computer and communications security, pp. 213-222. ACM, 2009.
|
[14]
|
Oualha, Nouha, Melek ?nen, and Yves Roudier. "A security protocol for self-organizing data storage." In Proceed-ings of The Ifip Tc 11 23 rd International Information Security Conference, pp. 675-679. Springer Boston, 2008. (6)
|
[15]
|
Duminuco, Alessandro, and Ernst Biersack. "Hierar-chical codes: How to make erasure codes attractive for peer-to-peer storage systems." In Peer-to-Peer Computing, 2008. P2P'08. Eighth International Conference on, pp. 89-98. IEEE, 2008.
|