Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing

@article{Wang2010PrivacyPreservingPA,
  title={Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing},
  author={Xinyu Wang and Qian Wang and Kui Ren and Wenjing Lou},
  journal={2010 Proceedings IEEE INFOCOM},
  year={2010},
  pages={1-9}
}
Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in… CONTINUE READING
Highly Influential
This paper has highly influenced 79 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 1,352 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 773 extracted citations

Cloud Computing : Technical , Non-Technical and Security Issues

Wada Abdullahi
2015
View 9 Excerpts
Highly Influenced

Guide to Vulnerability Analysis for Computer Networks and Systems

Computer Communications and Networks • 2018
View 4 Excerpts
Highly Influenced

Analysis & auditing of network traffic in cloud environment

2017 International Conference on Intelligent Computing and Control Systems (ICICCS) • 2017
View 4 Excerpts
Highly Influenced

Auditing for Distributed Storage Systems

IEEE/ACM Transactions on Networking • 2016
View 10 Excerpts
Highly Influenced

Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud

IEEE Transactions on Information Forensics and Security • 2016
View 6 Excerpts
Highly Influenced

Achieving data privacy on hybrid cloud

Security and Communication Networks • 2015
View 4 Excerpts
Highly Influenced

1,353 Citations

0100200300'10'12'14'16'18
Citations per Year
Semantic Scholar estimates that this publication has 1,353 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 26 references

Compact Proofs of Retrievability

ASIACRYPT • 2008
View 10 Excerpts
Highly Influenced

Pors: proofs of retrievability for large files

ACM Conference on Computer and Communications Security • 2007
View 5 Excerpts
Highly Influenced

Provable data possession at untrusted stores

ACM Conference on Computer and Communications Security • 2007
View 10 Excerpts
Highly Influenced

Aggregate and Verifiably Encrypted Signatures from Bilinear Maps

IACR Cryptology ePrint Archive • 2002
View 4 Excerpts
Highly Influenced

Protocols for Public Key Cryptosystems

1980 IEEE Symposium on Security and Privacy • 1980
View 5 Excerpts
Highly Influenced

Draft nist working definition of cloud computing,

P. Mell, T. Grance
Referenced on June • 2009
View 1 Excerpt

Similar Papers

Loading similar papers…