Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, and I. Stoica, “Above the clouds: A Berkeley view of cloud computing,” Dept. Electrical Eng. and Comput. Sciences, University of California, Berkeley, Rep. UCB/EECS, vol. 28, p. 13, 2009.
    2. Jian Liu, Kun Huang, Hong Rong, Huimei Wang, and Ming Xian, “Privacy-Preserving Public Auditing for Regenerating -Code-Based Cloud Storage,” in IEEE Trans. on information forensics and security , vol.. 10,no. 7, July 2015.
    3. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07. New York, NY, USA: ACM, 2007, pp. 598– 609.
    4. A. Juels and B. S. Kaliski Jr, “Pors: Proofs of retrievability for large files,” in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp. 584–597.
    5. R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “Mr-pdp: Multiple replica provable data possession,” in Distributed Computing Systems, 2008. ICDCS’08. The 28th International Conference on. IEEE, 2008, pp. 411–420.
    6. K. D. Bowers, A. Juels, and A. Oprea, “Hail: a highavailability and integrity layer for cloud storage,” in Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009, pp. 187–198.
    7. J. He, Y. Zhang, G. Huang, Y. Shi, and J. Cao, “Distributed data possession checking for securing multiple replicas in geographically dispersed clouds,” Journal of Computer and System Sciences, vol. 78, no. 5, pp. 1345–1358, 2012.
    8. Chen, R. Curtmola, G. Ateniese, and R. Burns, “Remote data checking for network coding-based distributed storage systems,” in Proceedings of the 2010 ACM workshop on Cloud computing security workshop. ACM, 2010, pp. 31–42.
    9. H. Chen and P. Lee, “Enabling data integrity protection in regenerating coding-based cloud storage: Theory and implementation,” Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 2, pp. 407–416, Feb 2014
    10. K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” Parallel and Distributed Systems, IEEE Transactions on, vol. 24, no. 9, pp. 1717–1726, 2013.
    11. Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, “Cooperative provable data possession for integrity verification in multicloud storage,” Parallel and Distributed Systems, IEEE Transactions on, vol. 23, no. 12, pp. 2231– 2244, 2012.
    12. A. G. Dimakis, K. Ramchandran, Y. Wu, and C. Suh, “A survey on network codes for distributed storage,” Proceedings of the IEEE, vol. 99, no. 3, pp. 476– 489, 2011. [12] H. Shacham and B. Waters, “Compact proofs of retrievability,” in Advances in CryptologyASIACRYPT 2008. Springer, 2008, pp. 90– 107.
    13. Y. Hu, H. C. Chen, P. P. Lee, and Y. Tang, “Nccloud: Applying network coding for the storage repair in a cloud-of-clouds,” in USENIX FAST, 2012
    14. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacypreserving public auditing for data storage security in cloud computing,” in INFOCOM, 2010IEEE, 2010, pp. 1–9.
    15. C.Wang,S.S.Chow,Q.Wang,K.Ren,andW.Lou“Privacy -preserving public auditing for secure cloud storage,” Computers, IEEE Transactions on, vol. 62, no. 2, pp. 362–375, 2013
    16. Yogesh Shinde, Omprakash Tembhurne “A review of protect the integrity of outsourced data using third party auditing for secure cloud storage,” Computers, International Journal of Science and Research(IJSR)
    17. Mr.Satish Shelar1, Prof.S.Y.Raut2” Review On Regenerating Code Based Secure Cloud Storage Using Public Auditing " International Research Journal of Engineering and Technology (IRJET) Volume: 02 Issue: 09 | Dec-2015
    18. Yogesh Shinde , Alka Vishwa” Privacy Preserving using Data Partitioning Technique for Secure Cloud Storage” International Journal of Computer Applications (0975 – 8887) Volume 116 – No. 16, April 2015.
    19. Madhumati B.Shinde1, S. B. Sonkamble ” Survey on Secure Public Auditing and Privacy Preserving in Cloud” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (1) , 2015, 10-13
    20. Jyoti R Bolannavar1” Privacy-Preserving Public Auditing using TPA for Secure Cloud Storage” International Journal of Scientific Engineering and Research (IJSER) Volume 2 Issue 6, June 2014
    21. C. Erway, A. K¨upc¸¨u, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009, pp. 213–222.

Recent Article