Author:
Yang Songrun,Chang Jinyong
Publisher
Springer Science and Business Media LLC
Reference41 articles.
1. Song, D., Shi, E., Fischer, I., et al.: Cloud data protection for the masses. Computer 45(1), 39–45 (2012)
2. Deswarte, Y., Quisquater, J.J., Saidane. A.: Remote integrity checking. In: Working conference on integrity and internal control in information systems, pp. 1–11. Springer, New York (2003).
3. Yan, H., Li, J., Han, J., et al.: A novel efficient remote data possession checking protocol in cloud storage. IEEE Trans. Inf. Forensics Secur. 12(1), 78–88 (2017)
4. Yu, J., Wang, H.: Strong key-exposure resilient auditing for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 12(8), 1931–1940 (2017)
5. Wang, H., Wu, Q., Qin, B., et al.: Identity-based remote data possession checking in public clouds. Inst. Eng. Technol. 8(2), 114–121 (2014)