earticle

논문검색

Server Re-Tag Provable Data Possession in Public Cloud

목차

Abstract
 1. Introduction
 2. Related work
 3. Preliminaries
  3.1. System Model
  3.2. Design Goals
  3.3. Complexity Assumptions
  3.4. Proxy Re-signatures
 4. Our Server Re-tag Provable Data Possession Scheme
  4.1. Our Construction
  4.2. Security Analysis
  4.3. Batch Auditing for Data in Multi-client and cloud server
  4.4. Performance Evaluation
 5. Conclusions
 Acknowledgements
 References

저자정보

  • Yongjun Ren School of Computer and Software, Nanjing University of Information Science & Technology, Institute of Information Network Technology,Nanjing University of Posts and Telecommunications, Nanjing 210003, China
  • Jiang Xu School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing 210044, China
  • Jin Wang School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing 210044, China
  • Jeong-Uk Kim Department of Energy Grid, Sangmyung University, Seoul 110-743, Korea

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.