[1] A. Fu, S. Yu, Y. Zhang, H. Wang and C. Huang, "NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users," in IEEE Transactions on Big Data, vol. PP, no. 99, pp. 1-1.
doi: 10.1109/TBDATA.2017.2701347
[1] D. Fernandes, L. Soares, J. Gomes, et al, “Security issues in cloud environments: a survey,” International Journal of Information Security, vol. 12, no. 2, pp. 113-170, 2014.
[2] W. Hsien, C. Yang, and M. Hwang, “A survey of public auditing for secure data storage in cloud computing,” International Journal of Network Security, vol.18, no.1, pp. 133-142, 2016.
[3] J. Yu, K. Ren, C. Wang, et al, “Enabling Cloud Storage Auditing with Key-Exposure Resistance,” IEEE Transactions on Information Forensics and Security, vol.10, no.6, pp. 1167-1179, 2015.
[4] Q. Wang, C. Wang, K. Ren, et al, “Enabling public auditability and data dynamics for storage security in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011.
[5] S. Yu, “Big privacy: challenges and opportunities of privacy study in the age of big data,” IEEE Access, vol. 4, no. 6, pp. 2751-2763, 2016.
[6] C. Wang, Q. Wang, K. Ren, et al, “Privacy-preserving public auditing for data storage security in cloud computing,” Proceedings of IEEE INFOCOM, pp. 1-9, 2010.
[7] B. Wang, B. Li, and H. Li, “Oruta: privacy-preserving public auditing for shared data in the cloud,” IEEE Transactions on Cloud Computing, vol.2, no.1, pp.43-56, 2014.
[8] B. Wang, B. Li, and H. Li, “Knox: privacy-preserving auditing for shared data with large groups in the cloud,” Applied Cryptography and Network Security. Springer Berlin Heidelberg, pp. 507-525, 2012.
[9] B. Wang, H. Li, and M. Li, “Privacy-preserving public auditing for shared cloud data supporting group dynamics,” Proceedings of IEEE ICC, pp. 1946-1950, 2013.
[10] B. Wang, B. Li, and H. Li, “Public auditing for shared data with efficient user revocation in the cloud,” Proceedings of IEEE INFOCOM, pp. 2904- 2912, 2013.
[11] B. Wang, B. Li, and H. Li, “Panda: Public auditing for shared data with efficient user revocation in the cloud,” IEEE Transactions on Services Computing, vol.8, no.1, pp. 92-106, 2015.
[12] C. Liu, J. Chen, L. Yang, et al, “Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates,” IEEE Transactions on Parallel and Distributed Systems, vol.25, no.9, pp. 2234-2244, 2014.
[13] H. Wang, and Y. Zhang, “On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage,” IEEE Transactions on Parallel and Distributed Systems, vol.25, no.1, pp. 264-267, 2014.
[14] L. Huang, G. Zhang, and A. Fu, “Privacy-preserving public auditing for dynamic group based on hierarchical tree,” Journal of Computer Research and Development, vol.53, no.10, pp. 2334-2342, 2016. [15] Y. Yu, J. Ni, M. Au, et al, “Comments on a public auditing mechanism for shared cloud data service,” IEEE Transactions on Services Computing,vol.8, no.6, pp. 998-999 2015.
[16] G. Ateniese, R. Burns, R. Curtmola, et al, “Provable data possession at untrusted stores,” Proceedings of ACM CCS, pp. 598-609, 2007.
[17] A. Juels, and B. Kaliski, “PORs: Proofs of retrievability for large files,” Proceedings of ACM CCS, pp. 584-597, 2007.
[18] Y. Yu, M. H. Au, and Y. Mu, “Enhanced privacy of a remote data integrity-checking protocol,” International Journal of Information Security, vol. 14, no. 4, pp. 307-318, 2015.
[19] J. Yuan, and S. Yu, “Efficient public integrity checking for cloud data sharing with multi-user modification,” Proceedings of IEEE INFOCOM, pp. 2121-2129, 2014.
[20] H. Wang, “Identity-based distributed provable data possession in multicolored storage,” IEEE Transactions on Services Computing, vol.8, no.2, pp.328-340, 2015.
[21] L. Huang, G. Zhang, A. Fu, “Certificateless Public Verification Scheme with Privacy-preserving and Message Recovery for Dynamic Group,” Proceedings of ACSW, 2017.
[22] T. Jiang, X. Chen, and J. Ma, “Public integrity auditing for shared dynamic cloud data with group user revocation,” IEEE Transactions on Computers, vol.65, no.8, pp.2363-2373, 2016.
[23] H. Wang, “Proxy Provable Data Possession in Public Clouds,” IEEE Transactions on Services Computing, vol.6, no.4, pp.551-559, 2013.
[24] Y. Yu, Y. L, J. N, et al., “Comments on public integrity auditing for dynamic data sharing with multiuser modification,” IEEE Transactions on Information Forensics and Security, vol.11, no.3, pp.658-659, 2016.
[25] H. Jin, D. Wong, and Y. Xu, “Efficient group signature with forward secure revocation,” Security Technology. Springer Berlin Heidelberg, pp. 124-131, 2009.
[26] Mr. M. VEERABRAHMA CHARY, Mrs.N.SUJATHA,” A Novel Additive Multi-Keyword Search for Multiple Data Owners in Cloud Computing .” International Journal of Computer Engineering In Research Trends., vol.3, no.6, pp. 308-313, 2016.
[27] G.Lucy, D.Jaya Narayana Reddy, R.Sandeep Kumar,” Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data.” International Journal of Computer Engineering In Research Trends., vol.2, no.12, pp. 919-923, 2015.
[28] G.Dileep Kumar, A.Sreenivasa Rao,” Privacy-Preserving Public Auditing using TPA for Secure Searchable Cloud Storage data.” International Journal of Computer Engineering In Research Trends., vol.2, no.11, pp. 767-770, 2015.
[29] N. Meghasree, U.Veeresh, Dr.S.Prem Kumar,” Multi Cloud Architecture to Provide Data Privacy and Integrity.” International Journal of Computer Engineering In Research Trends., vol.2, no.9, pp. 558-564, 2015.
[30] P.FARZANA, A.HARSHAVARDHAN,” Integrity Auditing for Outsourced Dynamic Cloud Data with Group User Revocation.” International Journal of Computer Engineering In Research Trends., vol.2, no.11, pp. 877-881, 2015.