logo

SCIENCE CHINA Information Sciences, Volume 59, Issue 3: 039101(2016) https://doi.org/10.1007/s11432-016-5519-7

Public verifiability for shared data in cloud storage with a defense against collusion attacks

More info
  • ReceivedSep 29, 2015
  • AcceptedNov 24, 2015
  • PublishedJan 18, 2016

Abstract


Funded by

Program for Changjiang Scholars and Innovative Research Team in University(IRT201206)

Research Fund for the Doctoral Program of Higher Education of China(20120009110007)

Program for New Century Excellent Talents in University(NCET-11-0565)


Acknowledgment

Acknowledgments

This work was supported by Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20120009110007), Program for Changjiang Scholars and Innovative Research Team in University (Grant No. IRT201206), and Program for New Century Excellent Talents in University (Grant No. NCET-11-0565).


References

[1] Kwon O, Koo D Y, Shin Y J, et al. Sci World J, 2014, 2014: 1-16 Google Scholar

[2] Wang B Y, Li B C, Li H. IEEE Trans Cloud Comput, 2014, 2: 43-56 Google Scholar

[3] Wang B Y, Li B C, Li H. Knox: privacy-preserving auditing for shared data with large groups in the cloud. In: Proceedings of 10th International Conference on Applied Cryptography and Network Security, Singapore, 2012. 507--525. Google Scholar

[4] Wang B Y, Li B C, Li H. IEEE Trans Serv Comput, 2013, 8: 92-106 Google Scholar

[5] Yuan J W, Yu S C. Public integrity auditing for dynamic data sharing with multi-user modification. In: Proceedings of 33rd Annual IEEE International Conference on Computer Communications, Toronto, 2014. 2121--2129. Google Scholar

[6] Jiang T, Chen X F, Ma J F. IEEE Trans Comput, 2015, PP: 1-106 Google Scholar

[7] Boneh D, Lynn B, Shacham H. J Cryptol, 2004, 17: 297-319 Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1