[1]
K. Julisch and M. Hall, Security and control in the cloud, Information Security Journal: A Global Perspective, vol. 19, no. 6, p.299–309, (2010).
DOI: 10.1080/19393555.2010.514654
Google Scholar
[2]
R. Wong, A. Fu, K. Wang, and J. Pei, Minimality attack in privacy preserving data publishing., VLDB Endowment, p.543–554.
Google Scholar
[3]
Y. Deswarte, J. Quisquater, and A. Sadane, Remote integrity checking, Integrity and Internal Control in Information Systems VI, p.1–11, (2004).
DOI: 10.1007/1-4020-7901-x_1
Google Scholar
[4]
K. Zeng, Publicly verifiable remote data integrity, Information and Communications Security, p.419–434, (2008).
Google Scholar
[5]
D. L. Gazzoni Filho and P. Barreto, Demonstrating data possession and uncheatable data transfer, Book Demonstrating.
Google Scholar
[6]
data possession and uncheatable data transfer, Series Demonstrating data possession and uncheatable data transfer, ed., Editor ed. ˆ eds., Citeseer, p.150, 2006. G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, Remote data checking using provable data possession, ACM Transactions on Information and System Security (TISSEC), vol. 14, no. 1, p.12, (2011).
DOI: 10.1145/1952982.1952994
Google Scholar
[7]
G. Ateniese, R. Di Pietro, L. Mancini, and G. Tsudik, Scalable and efficient provable data possession, in Proceedings of the 4th international conference on Security and privacy in communication netowrks. ACM, p.9.
DOI: 10.1145/1460877.1460889
Google Scholar
[8]
C. Wang, Q. Wang, K. Ren, and W. Lou, Ensuring data storage security in cloud computing., Ieee, p.1–9.
Google Scholar
[9]
R. Curtmola, O. Khan, and R. Burns, Robust remote data checking, in Proceedings of the 4th ACM international workshop on Storage security and survivability. ACM, p.63–68.
DOI: 10.1145/1456469.1456481
Google Scholar
[10]
A. Barsoum and M. Hasan, Provable possession and replication of data over cloud servers, Centre For Applied Cryptographic Research (CACR), University of Waterloo, Report, vol. 32, p.2010, (2010).
Google Scholar
[11]
H. Shacham and B. Waters, Compact proofs of retrievability, Advances in Cryptology-ASIACRYPT 2008, p.90–107, (2008).
DOI: 10.1007/978-3-540-89255-7_7
Google Scholar
[12]
R. Curtmola, O. Khan, R. Burns, and G. Ateniese, Mr-pdp: Multiple-replica provable data possession, " in Distributed Computing Systems, 2008. ICDCS, 08. The 28th International Conference on. IEEE, p.411–420.
DOI: 10.1109/icdcs.2008.68
Google Scholar
[13]
M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz,A. Konwinski, G. Lee, D. Patterson, A. Rabkin, and I. Stoica, Above the clouds: A berkeley view of cloud computing, Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, Tech. Rep., (2009).
DOI: 10.1145/1721654.1721672
Google Scholar
[14]
P. Golle, J. Staddon, and B. Waters, Secure conjunctive keyword search over encrypted data., Springer, p.31–45.
DOI: 10.1007/978-3-540-24852-1_3
Google Scholar
[15]
F. Seb, J. Domingo-Ferrer, A. Martinez-Balleste,Y. Deswarte, and J. Quisquater, Efficient remote data possession checking in critical information infrastructures.
DOI: 10.1109/tkde.2007.190647
Google Scholar
[16]
Knowledge and Data Engineering, IEEE Transactions on, vol. 20, no. 8, p.1034–1038, (2008).
Google Scholar
[17]
C. Erway, A. Kp, C. Papamanthou, and R. Tamassia, Dynamic provable data possession, in Proceedings of the 16th ACM conference on Computer and communications security. ACM, p.213–222.
DOI: 10.1145/1653662.1653688
Google Scholar
[18]
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner,Z. Peterson, and D. Song, Provable data possession at untrusted stores., ACM, p.598–609.
DOI: 10.1145/1315245.1315318
Google Scholar
[19]
C. Wang, Q. Wang, K. Ren, and W. Lou, Privacypreserving public auditing for data storage security in cloud computing. " IEEE, p.1–9. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public verifiability and data dynamics for storage security in cloud computing, Computer SecurityESORICS 2009, p.355–370, (2009).
DOI: 10.1007/978-3-642-04444-1_22
Google Scholar