
CLC number: TP309
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 2017-12-20
Cited: 0
Clicked: 9408
Li-bing Wu, Jing Wang, De-biao He, Muhammad-Khurram Khan. Cryptanalysis of an identity-based public auditing protocol for cloud storage[J]. Frontiers of Information Technology & Electronic Engineering,in press.https://doi.org/10.1631/FITEE.1601530 @article{title="Cryptanalysis of an identity-based public auditing protocol for cloud storage", %0 Journal Article TY - JOUR
云存储环境下一种基于身份的公开审计协议安全性分析关键词组: Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article
Reference[1]Ateniese, G., Burns, R., Curtmola, R., et al., 2007. Provable data possession at untrusted stores. Proc. 14th ACM Conf. on Computer and Communications Security, p.598-609. ![]() [2]Chen, B., Curtmola, R., 2012. Robust dynamic provable data possession. 32nd Int. Conf. on Distributed Computing Systems Workshops, p.515-525. ![]() [3]Fu, Z.J., Sun, X.M., Liu, Q., et al., 2015. Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun., E98.B(1):190-200. ![]() [4]Fu, Z.J., Ren, K., Shu, J.G., et al., 2016. Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parall. Distrib. Syst., 27(9):2546-2559. ![]() [5]Guo, P., Wang, J., Geng, X.H., et al., 2014. A variable threshold-value authentication architecture for wireless mesh networks. J. Intern. Technol., 15(6):929-935. ![]() [6]He, D.B., Zeadally, S., Wu, L.B., 2015. Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J., in press. ![]() [7]Li, J.T., Zhang, L., Liu, J.K., et al., 2016. Privacy-preserving public auditing protocol for low performance end devices in cloud. IEEE Trans. Inform. Forens. Secur., 11(11): 2572-2583. ![]() [8]Liu, J.K., Au, M.H., Huang, X., et al., 2016. Fine-grained two-factor access control for web-based cloud computing services. IEEE Trans. Inform. Forens. Secur., 11(3): 484-497. ![]() [9]Ren, Y.J., Shen, J., Wang, J., et al., 2015. Mutual verifiable provable data auditing in public cloud storage. J. Intern. Technol., 16(2):317-323. ![]() [10]Shacham, H., Waters, B., 2008. Compact proofs of retrievability. LNCS, 5350:90-107. ![]() [11]Shacham, H., Waters, B., 2013. Compact proofs of retrievability. J. Cryptol., 26(3):442-483. ![]() [12]Tan, S., Jia, Y., 2014. NaEPASC: a novel and efficient public auditing scheme for cloud data. J. Zhejiang Univ.-Sci. C (Comput. & Electron.), 15(9):794-804. ![]() [13]Wang, C., Chow, S.S.M., Wang, Q., et al., 2013. Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput., 62(2):362-375. ![]() [14]Xia, Z., Wang, X., Sun, X., et al., 2016. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parall. Distrib. Syst., 27(2):340-352. ![]() Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou
310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE | ||||||||||||||


ORCID:
Open peer comments: Debate/Discuss/Question/Opinion
<1>