[1]
J. Feng, Y. Chen, and Summerville, D.H. A Fair Multi-party Non-repudiation Scheme for Storage Clouds. Collaboration Technologies and Systems (CTS), (2011).
DOI: 10.1109/cts.2011.5928724
Google Scholar
[2]
R. Popa, J. Lorch, D. Molnar, H. Wang, and L. Zhuang. Enabling Security in Cloud Storage SLAs with CloudProof. Microsoft Tech Report MSR-TR-2010-46, May, (2010).
Google Scholar
[3]
S. Kamara and K. Lauter. Cryptographic Cloud Storage. Financial Cryptography and Data Security Lecture Notes in Computer Science Volume 6054, 2010, pp.136-149.
DOI: 10.1007/978-3-642-14992-4_13
Google Scholar
[4]
A. Bessani, M. Correia, B. Quaresma, F. André, P. Sousa, L. Portugal. DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds. Proceeding EuroSys '11 Proceedings of the sixth conference on Computer systems Pages 31-46.
DOI: 10.1145/1966445.1966449
Google Scholar
[5]
M. AlZain, E. Pardede, B. Soh, and J. Thom. Cloud computing security: from single to multi-clouds. the 45 th Hawaii International Conference on System Sciences, Hawaii, United States, (2012).
DOI: 10.1109/hicss.2012.153
Google Scholar
[6]
Bugiel, S., Nurnberger, S., Sadeghi, A.R., Schneide, T. Twin Clouds: An Architecture for Secure Cloud Computing. In: Workshop on Cryptography and Security in Clouds, Zurich, March 15-16 (2011).
Google Scholar
[7]
Bowers, K.D., Juels, A., Oprea, A. Hail: A high-availability and integrity layer for cloud storage. Cryptology ePrint Archive, Report 2008/489 (2008).
DOI: 10.1145/1653662.1653686
Google Scholar
[8]
A. Juels and Burton S. Kaliski. PORs: Proofs of Retrievability for Large Files. CCS '07 Proceedings of the 14th ACM conference on Computer and communications security Pages 584-597.
DOI: 10.1145/1315245.1315317
Google Scholar
[9]
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. CCS '07 Proceedings of the 14th ACM conference on Computer and communications security Pages 598-609.
DOI: 10.1145/1315245.1315318
Google Scholar
[10]
H. Shacham, B. Waters. Compact Proofs of Retrievability. Advances in Cryptology - ASIACRYPT 2008 Lecture Notes in Computer Science Volume 5350, 2008, pp.90-107.
DOI: 10.1007/978-3-540-89255-7_7
Google Scholar
[11]
Ari Juels, Burton S. Kaliski Jr. PORs: Proofs of retrievability for large files. In: ACM conference on computer and communications security.
DOI: 10.1145/1315245.1315317
Google Scholar
[12]
C. Wang, Q. Wang, and Kui Ren. Ensuring Data Storage Security in Cloud Computing. Quality of Service, 2009. IWQoS. 17th International.
DOI: 10.1109/iwqos.2009.5201385
Google Scholar