To Provide A Privacy Preserving Auditing Protocol In Cloud Computing Using Tpa
Abstract
Keywords
References
C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Storage Security in Cloud Computing,†Proc. IEEE INFOCOM ’10, Mar. 2010.
P. Mell and T. Grance, “Draft NIST Working Definition of Cloud Computing,†http://csrc.nist.gov/groups/SNS/cloudcomputing/ index.html, June 2009.
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the Clouds: A Berkeley View of Cloud Computing,†Technical Report UCB-EECS-2009-28, Univ. of California, Berkeley, Feb. 2009.
Cloud Security Alliance, “Top Threats to Cloud Computing,†http://www.cloudsecurityalliance.org, 2010.
M. Arrington, “Gmail Disaster: Reports of Mass Email Deletions,†http://www.techcrunch.com/2006/12/28/gmail-disasterreportsof- mass-email-deletions/, 2006.
J. Kincaid, “MediaMax/TheLinkup Closes Its Doors,†http:// www.techcrunch.com/2008/07/10/mediamaxthelinkup-closesits- doors/, July 2008.
Amazon.com, “Amazon s3 Availability Event: July 20, 2008,†http://status.aws.amazon.com/s3-20080720.html, July 2008.
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,†IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,†Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), pp. 598-609, 2007.
M.A. Shah, R. Swaminathan, and M. Baker, “Privacy-Preserving Audit and Extraction of Digital Contents,†Cryptology ePrint Archive, Report 2008/186, 2008.
A. Juels and J. Burton, S. Kaliski, “PORs: Proofs of Retrievability for Large Files,†Proc. ACM Conf. Computer and Comm. Security (CCS ’07), pp. 584-597, Oct. 2007.
Cloud Security Alliance, “Security Guidance for Critical Areas of Focus in Cloud Computing,†http://www.cloudsecurityalliance. org, 2009.
H. Shacham and B. Waters, “Compact Proofs of Retrievability,†Proc. Int’l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (Asiacrypt), vol. 5350, pp. 90-107, Dec. 2008.
C. Wang, K. Ren, W. Lou, and J. Li, “Towards Publicly Auditable Secure Cloud Data Storage Services,†IEEE Network Magazine, vol. 24, no. 4, pp. 19-24, July/Aug. 2010.
M.A. Shah, M. Baker, J.C. Mogul, and R. Swaminathan, “Auditing to Keep Online Storage Services Honest,†Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HotOS ’07), pp. 1-6, 2007.
104th United States Congress, “Health Insurance Portability and Accountability Act of 1996 (HIPPA),†http://aspe.hhs.gov/ admnsimp/pl104191.htm, 1996.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â