Page 84 - Read Online
P. 84

Jiang et al. J Surveill Secur Saf 2020;1:61-78  I  http://dx.doi.org/10.20517/jsss.2020.09                                          Page 77

               Ethical approval and consent to participate
               Not applicable.


               Consent for publication
               Not applicable.


               Copyright
               © The Author(s) 2020.


               REFERENCES
               1.   Qian L, Luo ZG, Du YJ, Guo LT. Cloud computing: an overview. Proceedings of the IEEE International Conference on Cloud
                   Computing; 2009 Sep 21-25; Bangalore, India. Springer; 2009. pp. 626-31.
               2.   Ion I, Sachdeva N, Kumaraguru P, Čapkun S. Home is safer than the cloud!: privacy concerns for consumer cloud storage. Proceedings of
                   the Seventh Symposium on Usable Privacy and Security; 2011 Jul 14-16; Pittsburgh, PA, USA. ACM; 2011. pp. 1-20.
               3.   Yu Y, Au MH, Ateniese G, Huang XY, Susilo W, et al. Identity-based remote data integrity checking with perfect data privacy preserving
                   for cloud storage. IEEE T Inf Foren Sec 2016;12:767-78.
               4.   Kang B, Wang J, Shao D. Attack on privacy-preserving public auditing schemes for cloud storage. Math Probl Eng 2017;2017:8062182.
               5.   Li Y, Yu Y, Yang B, Min G, Wu H. Privacy preserving cloud data auditing with efficient key update. Future Gener Comp Sy
                   2018;78:789-98.
               6.   Mehmood A, Natgunanathan I, Xiang Y, Hua G, Guo S. Protection of big data privacy. IEEE access 2016;4:1821-34.
               7.   More S, Chaudhari S. Third party public auditing scheme for cloud storage. Procedia Computer Science 2016;79:69-76.
               8.   Shen W, Yu J, Xia H, Zhang H, Lu X, et al. Light-weight and privacy-preserving secure cloud auditing scheme for group users via the
                   third party medium. J Netw Comp Appl 2017;82:56-64.
               9.   Wang H, He D, Yu J, Wang ZW. Incentive and unconditionally anonymous identity-based public provable data possession. IEEE T Serv
                   Comput 2019;12:824-35.
               10.  Balasubramanian V, Mala T. Cloud data integrity checking using bilinear pairing and network coding. Cluster Comput 2019;22:6927-35.
               11.  Yang G, Yu J, Shen W, Su Q, Fu Z, et al. Enabling public auditing for shared data in cloud storage supporting identity privacy and
                   traceability. J Syst Software 2016;113:130-9.
               12.  Deswarte Y, Quisquater JJ, Sadane A. Remote integrity checking. In: Working Conference on Integrity and Internal Control in Information
                   Systems. Springer; 2003. pp. 1-11.
               13.  Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, et al. Provable data possession at untrusted stores. Proceedings of the 14th ACM
                   conference on Computer and communications security; 2007 Oct 29- Nov 2; Alexandria, Virginia, USA. ACM; 2007. pp. 598-609.
               14.  Juels A, Kaliski BS. PORs: proofs of retrievability for large files. Proceedings of the 14th ACM conference on Computer and
                   communications security; 2007 Oct 29- Nov 2; Alexandria, Virginia, USA. ACM; 2007. pp. 84-97.
               15.  Wang C, Wang Q, Ren K, Lou WJ. Privacy-preserving public auditing for data storage security in cloud computing. Proceedings of the
                   29th IEEE Conference on Computer Communications; 2010 Mar 15-19; San Diego, CA, USA. IEEE ComSoc; 2010. pp. 1-9.
               16.  Wang Q, Wang C, Li J, Ren K, Lou W. Enabling public verifiability and data dynamics for storage security in cloud computing.
                   Proceedings of the 14th European Symposium on Research in Computer Security; 2009 Sep 21-23; Saint-Malo, France. Springer; 2009.
                   pp. 355-70.
               17.  Worku SG, Xu C, Zhao J, He X. Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput Electr Eng
                   2014;40:1703-13.
               18.  Wang C, Chow SSM, Wang Q, Ren K, Lou W. Privacy-preserving public auditing for secure cloud storage. IEEE T Comput
                   2013;62:362-75.
               19.  Garg N, Bawa S, Kumar N. An efficient data integrity auditing protocol for cloud computing. Future Gener Comput Syst 2020;109:306-16.
               20.  Yuan J, Yu S. Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans Inform Forensic Secur
                   2015;10:1717-26.
               21.  Suguna M, Mercy Shalinie S, Sivaranjani R. Integrity verification for shared data in group with user revocation. In: Zungeru AM,
                   Subashini S, Vetrivelan P, editors. Wireless Communication Networks and Internet of Things. Singapore: Springer; 2019. pp. 41-9.
               22.  Wang X, Weng J, Ma J, Yang X. Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification.
                   Inform Sciences 2019;488:13-8.
               23.  Zhang Y, Yu J, Hao R, Wang C, Kui R. Enabling efficient user revocation in identity-based cloud storage auditing for shared big data.
                   IEEE T Depend Secure 2020;17:608-19.
               24.  Wu Y, Jiang ZL, Wang X, Yiu SM, Zhang P. Dynamic data operations with deduplication in privacy-preserving public auditing for secure
                   cloud storage. Proceedings of the IEEE International Conference on Computational Science and Engineering and IEEE International
                   Conference on Embedded and Ubiquitous Computing; 2017 Jul 21-24; Guangzhou, Guangdong, China. IEEE; 2017. pp. 562-7.
               25.  Daniel E, Vasanthi NA. LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment. Cluster
                   Comput 2019;22:1247-58.
               26.  Tang X, Huang Y, Chang C, Zhou L. Efficient real-time integrity auditing With privacy-preserving arbitration for images in cloud storage
   79   80   81   82   83   84   85   86   87   88   89