TY - STD TI - Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable Data Possession at Untrusted Stores In: Proceedings of the 14th ACM Conference on Computer and Communications Security, 598–609. https://doi.org/10.1145/1315245.1315318. ID - ref1 ER - TY - STD TI - Ateniese G, Di Pietro R, Mancini LV, Tsudik G (2008) Scalable and Efficient Provable Data Possession In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, 1–9.. ACM. https://doi.org/10.1145/1460877.1460889. ID - ref2 ER - TY - STD TI - Ateniese G, Hohenberger S (2005) Proxy Re-signatures: New Definitions, Algorithms, and Applications. Proc 12th ACM Conf Comput Commun Secur:310–319. ID - ref3 ER - TY - STD TI - Blaze M, Bleumer G, Strauss M (1998) Divertible Protocols and Atomic Proxy Cryptography. Int Conf Theory Appl Cryptographic Tech:127–144. https://doi.org/10.1007/bfb0054122. ID - ref4 ER - TY - STD TI - Boneh D, Gentry C, Lynn B, Shacham H (2003) Aggregate and Verifiably Encrypted Signatures from Bilinear Maps:416–432. https://doi.org/10.1007/3-540-39200-9_26. ID - ref5 ER - TY - JOUR AU - Boneh, D. AU - Lynn, B. AU - Shacham, H. PY - 2004 DA - 2004// TI - Short Signatures from the Weil Pairing JO - J Cryptol VL - 17 UR - https://doi.org/10.1007/s00145-004-0314-9 DO - 10.1007/s00145-004-0314-9 ID - Boneh2004 ER - TY - JOUR AU - Buyya, R. AU - Yeo, C. S. AU - Venugopal, S. AU - Broberg, J. AU - Brandic, I. PY - 2009 DA - 2009// TI - Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility JO - Futur Gener Comput Syst VL - 25 UR - https://doi.org/10.1016/j.future.2008.12.001 DO - 10.1016/j.future.2008.12.001 ID - Buyya2009 ER - TY - JOUR AU - Chen, F. AU - Xiang, T. AU - Lei, X. AU - Chen, J. PY - 2014 DA - 2014// TI - Highly Efficient Linear Regression Outsourcing to a Cloud JO - IEEE Trans Cloud Comput VL - 2 UR - https://doi.org/10.1109/TCC.2014.2378757 DO - 10.1109/TCC.2014.2378757 ID - Chen2014 ER - TY - JOUR AU - Dong, X. AU - Yu, J. AU - Luo, Y. AU - Chen, Y. AU - Xue, G. AU - Li, M. PY - 2014 DA - 2014// TI - Achieving an Effective, Scalable and Privacy-Preserving Data Sharing Service in Cloud Computing JO - Comput Secur VL - 42 UR - https://doi.org/10.1016/j.cose.2013.12.002 DO - 10.1016/j.cose.2013.12.002 ID - Dong2014 ER - TY - JOUR AU - Dong, X. AU - Yu, J. AU - Zhu, Y. AU - Chen, Y. AU - Luo, Y. AU - Li, M. PY - 2015 DA - 2015// TI - SECO: Secure and Scalable Data Collaboration Services in Cloud Computing JO - Comput Secur VL - 50 UR - https://doi.org/10.1016/j.cose.2015.01.003 DO - 10.1016/j.cose.2015.01.003 ID - Dong2015 ER - TY - JOUR AU - Erway, C. C. AU - Küpçü, A. AU - Papamanthou, C. AU - Tamassia, R. PY - 2015 DA - 2015// TI - Dynamic Provable Data Possession JO - ACM Trans Inf Syst Secur (TISSEC) VL - 17 UR - https://doi.org/10.1145/2699909 DO - 10.1145/2699909 ID - Erway2015 ER - TY - JOUR AU - Garg, N. AU - Bawa, S. PY - 2016 DA - 2016// TI - Comparative Analysis of Cloud Data Integrity Auditing Protocols JO - J Netw Comput Appl VL - 66 UR - https://doi.org/10.1016/j.jnca.2016.03.010 DO - 10.1016/j.jnca.2016.03.010 ID - Garg2016 ER - TY - JOUR AU - Geeta, C. M. AU - Raghavendra, S. AU - Buyya, R. AU - Venugopal, K. R. AU - Iyengar, S. S. AU - Patnaik, L. M. PY - 2018 DA - 2018// TI - Data Auditing and Security in Cloud Computing: Issues, Challenges and Future Directions JO - Int J Comput (IJC) VL - 28 ID - Geeta2018 ER - TY - JOUR AU - Hall, R. AU - Fienberg, S. E. AU - Nardi, Y. PY - 2011 DA - 2011// TI - Secure Multiple Linear Regression based on Homomorphic Encryption JO - J Off Stat VL - 27 ID - Hall2011 ER - TY - JOUR AU - Hwang, J. Y. AU - Chen, L. AU - Cho, H. S. AU - Nyang, D. PY - 2015 DA - 2015// TI - Short Dynamic Group Signature Scheme Supporting Controllable Linkability JO - IEEE Trans Inf Forensic Secur VL - 10 UR - https://doi.org/10.1109/TIFS.2015.2390497 DO - 10.1109/TIFS.2015.2390497 ID - Hwang2015 ER - TY - JOUR AU - Jin, H. AU - Jiang, H. AU - Zhou, K. PY - 2018 DA - 2018// TI - Dynamic and Public Auditing with Fair Arbitration for Cloud Data JO - IEEE Trans Cloud Comput VL - 6 UR - https://doi.org/10.1109/TCC.2016.2525998 DO - 10.1109/TCC.2016.2525998 ID - Jin2018 ER - TY - STD TI - Li J, Yan H, Zhang Y (2018) Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage. IEEE Trans Serv Comput. https://doi.org/10.1109/tsc.2018.2789893. ID - ref17 ER - TY - JOUR AU - Li, J. AU - Yao, W. AU - Han, J. AU - Zhang, Y. AU - Shen, J. PY - 2017 DA - 2017// TI - User Collusion Avoidance CP-ABE with Efficient Attribute Revocation for Cloud Storage JO - IEEE Syst J VL - 12 UR - https://doi.org/10.1109/JSYST.2017.2667679 DO - 10.1109/JSYST.2017.2667679 ID - Li2017 ER - TY - JOUR AU - Liu, F. AU - Tong, J. AU - Mao, J. AU - Bohn, R. AU - Messina, J. AU - Badger, L. AU - Leaf, D. PY - 2011 DA - 2011// TI - NIST Cloud Computing Reference Architecture JO - NIST Spec Publ VL - 500 ID - Liu2011 ER - TY - STD TI - Luo Y, Xu M, Fu S, Wang D, Deng J (2015) Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation In: Trustcom/BigDataSE/ISPA, IEEE, vol. 1, 434–442. https://doi.org/10.1109/trustcom.2015.404. ID - ref20 ER - TY - STD TI - Pairing Based Cryptography (PBC) Library. http://crypto.stanford.edu/pbc/,2014... UR - http://crypto.stanford.edu/pbc/,2014.. ID - ref21 ER - TY - JOUR AU - Pattar, S. AU - Buyya, R. AU - Venugopal, K. R. AU - Iyengar, S. AU - Patnaik, L. PY - 2018 DA - 2018// TI - Searching for the IoT Resources: Fundamentals, Requirements, Comprehensive Review, and Future Directions JO - IEEE Commun Surv Tutor VL - 20 UR - https://doi.org/10.1109/COMST.2018.2825231 DO - 10.1109/COMST.2018.2825231 ID - Pattar2018 ER - TY - JOUR AU - Raghavendra, S. AU - Doddabasappa, P. A. AU - Geeta, C. M. AU - Buyya, R. AU - Venugopal, K. R. AU - Iyengar, S. S. AU - Patnaik, L. M. PY - 2016 DA - 2016// TI - Secure Multi-Keyword Search and Multi-User Access Control over an Encrypted Cloud Data JO - Int J Inf Process VL - 10 ID - Raghavendra2016 ER - TY - STD TI - Raghavendra S, Geeta CM, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2015) MSIGT: Most Significant Index Generation Technique for Cloud Environment In: Proceedings of the Annual IEEE India Conference (INDICON), 1–6. https://doi.org/10.1109/indicon.2015.7443531. ID - ref24 ER - TY - JOUR AU - Ren, K. AU - Wang, C. AU - Wang, Q. PY - 2012 DA - 2012// TI - Security Challenges for the Public Cloud JO - IEEE Internet Comput VL - 16 UR - https://doi.org/10.1109/MIC.2012.14 DO - 10.1109/MIC.2012.14 ID - Ren2012 ER - TY - JOUR AU - Shen, J. AU - Shen, J. AU - Chen, X. AU - Huang, X. AU - Susilo, W. PY - 2017 DA - 2017// TI - An Efficient Public Auditing Protocol with Novel Dynamic Structure for Cloud Data JO - IEEE Trans Inf Forensic Secur VL - 12 UR - https://doi.org/10.1109/TIFS.2017.2705620 DO - 10.1109/TIFS.2017.2705620 ID - Shen2017 ER - TY - JOUR AU - Shen, W. AU - Qin, J. AU - Yu, J. AU - Hao, R. AU - Hu, J. PY - 2019 DA - 2019// TI - Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage JO - IEEE Trans Inf Forensic Secur VL - 14 UR - https://doi.org/10.1109/TIFS.2018.2850312 DO - 10.1109/TIFS.2018.2850312 ID - Shen2019 ER - TY - STD TI - Tarannum S, Aravinda B, Nalini L, Venugopal KR, Patnaik LM (2006) Routing Protocol for Lifetime Maximization of Wireless Sensor Networks In: International Conference on Advanced Computing and Communications, 401–406.. IEEE. https://doi.org/10.1109/adcom.2006.4289925. ID - ref28 ER - TY - STD TI - Tate SR, Vishwanathan R, Everhart L (2013) Multi-User Dynamic Proofs of Data Possession using Trusted Hardware In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 353–364. https://doi.org/10.1145/2435349.2435400. ID - ref29 ER - TY - JOUR AU - Tian, H. AU - Chen, Y. AU - Chang, C. C. AU - Jiang, H. AU - Huang, Y. AU - Chen, Y. AU - Liu, J. PY - 2017 DA - 2017// TI - Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage JO - IEEE Trans Serv Comput VL - 10 UR - https://doi.org/10.1109/TSC.2015.2512589 DO - 10.1109/TSC.2015.2512589 ID - Tian2017 ER - TY - JOUR AU - Tian, H. AU - Nan, F. AU - Jiang, H. AU - Chang, C. C. AU - Ning, J. AU - Huang, Y. PY - 2019 DA - 2019// TI - Public Auditing for Shared Cloud Data with Efficient and Secure Group Management JO - Inf Sci VL - 472 UR - https://doi.org/10.1016/j.ins.2018.09.009 DO - 10.1016/j.ins.2018.09.009 ID - Tian2019 ER - TY - STD TI - Tian JF, Guo RF, Jing X (2019) Stern-Brocot-based Non-Repudiation Dynamic Provable Data Possession. IEEE Access. https://doi.org/10.1109/access.2019.2916173. ID - ref32 ER - TY - BOOK AU - Venugopal, K. R. AU - Buyya, R. PY - 2013 DA - 2013// TI - Mastering C++ PB - McGraw-Hill Education CY - New Delhi ID - Venugopal2013 ER - TY - STD TI - Venugopal KR, Rajan EE, Kumar PS (1998) Performance Analysis of Wavelength Converters in WDM Wavelength Routed Optical Networks In: Proceedings. Fifth International Conference on High Performance Computing (Cat. No. 98EX238), 239–246.. IEEE. https://doi.org/10.1109/hipc.1998.737994. ID - ref34 ER - TY - JOUR AU - Venugopal, K. R. AU - Rajan, E. E. AU - Kumar, P. S. PY - 1999 DA - 1999// TI - Impact of Wavelength Converters in Wavelength Routed All-Optical Networks JO - Comput Commun VL - 22 UR - https://doi.org/10.1016/S0140-3664(98)00244-8 DO - 10.1016/S0140-3664(98)00244-8 ID - Venugopal1999 ER - TY - STD TI - Venugopal KR, Srinivasa KG, Patnaik LM (2009) Soft Computing for Data Mining Applications. Springer. https://doi.org/10.1007/978-3-642-00193-2. ID - ref36 ER - TY - STD TI - Wang B, Li B, Li H (2012) Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud. Int Conf Appl Crypt Netw Secur:507–525. https://doi.org/10.1007/978-3-642-31284-7_30. ID - ref37 ER - TY - JOUR AU - Wang, B. AU - Li, B. AU - Li, H. PY - 2014 DA - 2014// TI - Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud JO - IEEE Trans Cloud Comput VL - 2 UR - https://doi.org/10.1109/TCC.2014.2299807 DO - 10.1109/TCC.2014.2299807 ID - Wang2014 ER - TY - JOUR AU - Wang, B. AU - Li, B. AU - Li, H. PY - 2015 DA - 2015// TI - Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud JO - IEEE Trans Serv Comput VL - 8 UR - https://doi.org/10.1109/TSC.2013.2295611 DO - 10.1109/TSC.2013.2295611 ID - Wang2015 ER - TY - JOUR AU - Wu, T. Y. AU - Tseng, Y. M. AU - Huang, S. S. AU - Lai, Y. C. PY - 2017 DA - 2017// TI - Non-Repudiable Provable Data Possession Scheme with Designated Verifier in Cloud Storage Systems JO - IEEE Access VL - 5 UR - https://doi.org/10.1109/ACCESS.2017.2753243 DO - 10.1109/ACCESS.2017.2753243 ID - Wu2017 ER - TY - JOUR AU - Xu, X. AU - Zhou, J. AU - Wang, X. AU - Zhang, Y. PY - 2016 DA - 2016// TI - Multi-Authority Proxy Re-encryption Based on CPABE for Cloud Storage Systems JO - J Syst Eng Electron VL - 27 ID - Xu2016 ER - TY - JOUR AU - Yan, H. AU - Li, J. AU - Han, J. AU - Zhang, Y. PY - 2016 DA - 2016// TI - A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage JO - IEEE Trans Inf Forensic Secur VL - 12 UR - https://doi.org/10.1109/TIFS.2016.2601070 DO - 10.1109/TIFS.2016.2601070 ID - Yan2016 ER - TY - STD TI - Yan H, Li J, Zhang Y (2019) Remote Data Checking with a Designated Verifier in Cloud Storage. IEEE Syst J. https://doi.org/10.1109/jsyst.2019.2918022. ID - ref43 ER - TY - JOUR AU - Yang, G. AU - Yu, J. AU - Shen, W. AU - Su, Q. AU - Fu, Z. AU - Hao, R. PY - 2016 DA - 2016// TI - Enabling Public Auditing for Shared Data in Cloud Storage Supporting Identity Privacy and Traceability JO - J Syst Softw VL - 113 UR - https://doi.org/10.1016/j.jss.2015.11.044 DO - 10.1016/j.jss.2015.11.044 ID - Yang2016 ER - TY - JOUR AU - Yu, Y. AU - Ni, J. AU - Xia, Q. AU - Wang, X. AU - Yang, H. AU - Zhang, X. PY - 2016 DA - 2016// TI - SDIVIP2: Shared Data Integrity Verification with Identity Privacy Preserving in Mobile Clouds JO - Concurr Comput Pract Experience VL - 28 UR - https://doi.org/10.1002/cpe.3484 DO - 10.1002/cpe.3484 ID - Yu2016 ER - TY - JOUR AU - Yuan, J. AU - Yu, S. PY - 2015 DA - 2015// TI - Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification JO - IEEE Trans Inf Forensic Secur VL - 10 UR - https://doi.org/10.1109/TIFS.2015.2423264 DO - 10.1109/TIFS.2015.2423264 ID - Yuan2015 ER - TY - STD TI - Zhu Y, Wang H, Hu Z, Ahn GJ, Hu H, Yau SS (2011) Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds In: Proceedings of the 2011 ACM Symposium on Applied Computing, 1550–1557. https://doi.org/10.1145/1982185.1982514. ID - ref47 ER - TY - JOUR AU - Zhu, Z. AU - Jiang, R. PY - 2015 DA - 2015// TI - A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud JO - IEEE Trans Parallel Distrib Syst VL - 27 UR - https://doi.org/10.1109/TPDS.2015.2388446 DO - 10.1109/TPDS.2015.2388446 ID - Zhu2015 ER -