Author:
Deshmukh Araddhana Arvind,Mihovska Albena,Prasad Ramjee,Gardas Naresh
Reference14 articles.
1. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609 (2007)
2. Ateniese, G.L.V.M., Pietro, R.D., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of the International Conference on Security and Privacy in Communication Netowrks, pp. 46–66 (2008)
3. Wang, C., Wang, Q., Ren, K.: Ensuring data storage security in cloud computing. In: Proceedings of the 17th International Workshop Quality Service, pp. 1–9 (2009)
4. Juels, A., Kaliski, B.S.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference Computer and Communications Security, pp. 584–597 (2007)
5. Zheng, Q., Xu, S.: Secure and efficient proof of storage with deduplication. In: Proceedings of the ACM Conference Data Application Security Privacy, pp. 1–12 (2012)