Beruflich Dokumente
Kultur Dokumente
clear mapping relationship between the data and [5] G.Ateniese, R. Di Pietro, L.V. Mancini,
tags in the current construction, data level dynamic and G. Tsudik, Scalable
scan be supported by using block level dynamics. [6] C. Erway, A. Ku pcu , C. Papamanthou,
Whenever a piece of data is modified the and R. Tamassia, Dynamic Provable Data
corresponding blocks and tags are updated. Possession, Proc. 16th ACM Conf.
However this can bring unnecessary computation Computer and Comm. Security (CCS 09),
and communication costs. We aim to achieve a pp. 213-222, 2009.
level dynamics at minimal costs in our future work. [7] C. Wang, Q. Wang, K. Ren, and W. Lou,
Ensuring Data Storage Security in Cloud
FUTURE ENHANCEMENT Computing, Proc. 17th Intl Workshop
Quality of Service (IWQoS 09),pp. 1-9,
Finally, We believe that cloud data storage
July 2009.
security is still full of challenges and of paramount
[8] Q. Wang, C. Wang, J. Li, K. Ren, and W.
importance and many research problems remain to
Lou, Enabling Public Verifiability and
be identified.
Data Dynamics for Storage Security in
REFERENCE Cloud Computing, Proc. 14thEuropean
[1] F. Sabe, J. Domingo-Ferrer, A. Martinez- Conf. Research in Computer Security
Balleste, Y. Deswarte, and J.-J.Quisquater, (ESORICS), Sept. 2009.
Efficient Remote Data Possession [9] Y. Deswarte and J-J.Quisqater, Remote
Checking in Critical Information Integrity Checking, Proc. Sixth Conf.
Infrastructures, IEEE Trans. Knowledge Integrity and internal control in
and Data Eng.,vol. 20, no. 8, pp. 1034- Information systems(IICIS 04),pp. 1-11,
1038, Aug. 2008. 2004.
[2] R. Buyya, C.S. Yeo, S. Venugopal, J.
[10] D.L.G Filho and P.S.L.M. Barreto,
Broberg, and I. Brandic, Cloud
Demonstrating data possession and
Computing and Emerging IT Platforms:
Uncheatable Data
Vision, Hype, and Reality for Delivering
Transfer.CryptologyePrint Archive,
Computing as the Fifth Utility, Future
Report 2006/150, http://eprint.iacr.org/ ,
Generation Computer Systems vol. 25, no.
2006 .
6, pp. 599-616, 2009.
[3] G.Ateniese, R. Burns, R. Curtmola, J. [11] http://java.sun.com
Herring, L. Kissner, Z. Peterson, and D.
[12] http://www.sourcefordgde.com
Song, Provable Data Possession at Un
trusted Stores, Proc. 14th ACM Conf. [13] http://www.networkcomputing.com
Computer and Comm. Security (CCS 07),
pp. 598-609, 2007. [14] http://www.roseindia.com
[4] R.Curtmola, O. Khan, R. Burns, and G.
[15] http://java2s.com
Ateniese, MR-PDP: Multiple-Replica
Provable Data Possession, Proc. 28th
Intl Conf. Distributed Computing
Systems (ICDCS 08), 2008.