Asian Journal of Information Technology

Year: 2019
Volume: 18
Issue: 4
Page No. 133 - 138

Privacy and Auditability in Cloud Assisted Health Data

Authors : K. Vijaya Swetha, P. Sai Kiran and K.V.V. Satyanarayana


Ateniese, G., R. di Pietro, L.V. Mancini and G. Tsudik, 2008. Scalable and efficient provable data possession. Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, September 22-25, 2008, New York, USA., pp: 1-11.

Barsoum, A.F. and M.A. Hasan, 2015. Provable multicopy dynamic data possession in cloud computing systems. IEEE. Trans. Inf. Forensics Secur., 10: 485-497.
CrossRef  |  Direct Link  |  

Deswarte, Y., J.J. Quisquater and A. Saidane, 2004. Remote Integrity Checking. In: Integrity and Internal Control in Information Systems VI. Jajodia, S. and L. Strous (Eds.). Springer US, Berlin, Germany, ISBN: 978-1-4020-7900-9, pp: 1-11.

Erway, C., A. Kupcu, C. Papamanthou and R. Tamassia, 2009. Dynamic provable data possession. Proceedings of the 16th ACM Conference on Computer and Communications Security, November 9-13, 2009, Chicago, IL., USA., pp: 213-222.

Golle, P., S. Jarecki and I. Mironov, 2002. Cryptographic Primitives Enforcing Communication and Storage Complexity. In: Financial Cryptography. Matt, B. (Ed.). Springer Berlin Heidelberg, Berlin, Germany, ISBN: 978-3-540-00646-6, pp: 120-135.

Hao, Z. and N. Yu, 2010. A multiple-replica remote data possession checking protocol with public verifiability. Proceedings of the 2010 Second International Symposium on Data, Privacy and E-Commerce (ISDPE), September 13-14, 2010, IEEE, Buffalo, New York, USA., ISBN: 978-1-4244-8377-8, pp: 84-89.

Hao, Z., S. Zhong and N. Yu, 2011. A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng., 23: 1432-1437.
CrossRef  |  

Mykletun, E., M. Narasimha and G. Tsudik, 2006. Authentication and integrity in outsourced databases. ACM. Trans. Storage TOS., 2: 107-138.
CrossRef  |  Direct Link  |  

Sebe, F., F.J. Domingo, B.A. Martinez, Y. Deswarte and J.J. Quisquater, 2008. Efficient remote data possession checking in critical information infrastructures. IEEE. Trans. Knowl. Data Eng., 20: 1034-1038.
CrossRef  |  Direct Link  |  

Shah, M.A., M. Baker, J.C. Mogul and R. Swaminathan, 2007. Auditing to keep online storage services honest. Proceedings of the 11th USENIX Workshop Hot Topics Operational System HOTOS, May 7-9, 2007, HOTOS, Catamaran Resort Hotel, San Diego, California, pp: 1-6.

Tong, Y., J. Sun, S.S. Chow and P. Li, 2014. Cloud-assisted mobile-access of health data with privacy and auditability. IEEE. J. Biomed. Health Inf., 18: 419-429.
CrossRef  |  Direct Link  |  

Wang, C., Q. Wang, K. Ren and W. Lou, 2010. Privacy-preserving public auditing for data storage security in cloud computing. Proceedings of the 2010 IEEE Conference on INFOCOM, March 14-19, 2010, IEEE, San Diego, California, pp: 1-9.

Wang, Q., C. Wang, J. Li, K. Ren and W. Lou, 2009. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. In: Computer Security. Backes, M. and P. Ning (Eds.). Springer Berlin Heidelberg, Berlin, Germany, ISBN: 978-3-642-04443-4, pp: 355-370.

Design and power by Medwell Web Development Team. © Medwell Publishing 2022 All Rights Reserved