On the security of three public auditing schemes in cloud computing

被引:0
|
作者
Ming, Yang [1 ]
Wang, Yumin [2 ]
机构
[1] School of Information Engineering, Chang'an University, Xi'an, Shaanxi,710064, China
[2] State Key Laboratory of ISN, Xidian University, Xi'an, Shaanxi,710071, China
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Public key cryptography
引用
收藏
页码:795 / 802
相关论文
共 50 条
  • [1] Public Auditing Scheme for Data Storage Security in Cloud Computing
    Subha, T.
    Jayashri, S.
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 773 - 787
  • [2] Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
    Wang, Cong
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [3] Optimized Public Auditing and Data Dynamics for Data Storage Security in Cloud Computing
    Singh, Anirudha Pratap
    Pasupuleti, Syam Kumar
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS, 2016, 93 : 751 - 759
  • [4] A Hierarchical Security-Auditing Methodology for Cloud Computing
    Han, Zhuobing
    Li, Xiaohong
    Stroulia, Eleni
    2015 IEEE 12TH INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2015), 2015, : 202 - 209
  • [5] Data and infrastructure security auditing in cloud computing environments
    Rasheed, Hassan
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2014, 34 (03) : 364 - 368
  • [6] Batch public auditing for distributed mobile cloud computing
    Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, Fujian
    350117, China
    Int. J. High Perform. Comput. Networking, 2 (102-109):
  • [7] Providing a public auditing cryptographic approach in cloud computing
    Ashalatha R.
    Agarkhed J.
    Patil S.R.
    International Journal of Electronic Business, 2020, 15 (03): : 235 - 248
  • [8] Security analysis of public cloud computing
    Idziorek, Joseph
    Tannian, Mark
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2012, 9 (1-2) : 4 - 20
  • [9] Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing
    Zhang, Wenfang
    Jiao, Heng
    Yan, Zhuoqun
    Wang, Xiaomin
    Khan, Muhammad Khurram
    COMPUTERS & SECURITY, 2023, 125
  • [10] The State of the Public Cloud: Security Concerns with Cloud Computing
    Cain, Chandler
    Raymond, David
    Ransbottom, J. Scot
    IEEE SOUTHEASTCON 2020, 2020,