1 J. Wang, "Verifiable auditing for outsourced database in cloud computing" 64 (64): 3293-3303, 2015
2 M. Sookhak, "Towards dynamic remote data auditing in computational clouds" 12 : 2014
3 C. Wang, "Toward publicly auditable secure cloud data storage services" 24 (24): 19-24, 2010
4 G. Ateniese, "Scalable and efficient provable data possession" 1-10, 2008
5 M. Sookhak, "Remote data auditing in cloud computing environments: A survey, taxonomy, and open issues" 47 (47): 2015
6 T. Jiang, "Public integrity auditing for shared dynamic cloud data with group user revocation" 65 (65): 2363-2373, 2015
7 Y. Yu, "Provably secure identity based provable data possession" 310-325, 2015
8 A. F. Barsoum, "Provable multicopy dynamic data possession in cloud computing systems" 10 (10): 485-497, 2015
9 G. Ateniese, "Provable data possession at untrusted stores" 598-609, 2007
10 C. Wang, "Privacy-preserving public auditing for secure cloud storage" 62 (62): 362-375, 2013
1 J. Wang, "Verifiable auditing for outsourced database in cloud computing" 64 (64): 3293-3303, 2015
2 M. Sookhak, "Towards dynamic remote data auditing in computational clouds" 12 : 2014
3 C. Wang, "Toward publicly auditable secure cloud data storage services" 24 (24): 19-24, 2010
4 G. Ateniese, "Scalable and efficient provable data possession" 1-10, 2008
5 M. Sookhak, "Remote data auditing in cloud computing environments: A survey, taxonomy, and open issues" 47 (47): 2015
6 T. Jiang, "Public integrity auditing for shared dynamic cloud data with group user revocation" 65 (65): 2363-2373, 2015
7 Y. Yu, "Provably secure identity based provable data possession" 310-325, 2015
8 A. F. Barsoum, "Provable multicopy dynamic data possession in cloud computing systems" 10 (10): 485-497, 2015
9 G. Ateniese, "Provable data possession at untrusted stores" 598-609, 2007
10 C. Wang, "Privacy-preserving public auditing for secure cloud storage" 62 (62): 362-375, 2013
11 A. Juels, "PORs: Proofs of retrievability for large files" 584-597, 2007
12 A. F. Barsoum, "On Verifying Dynamic Multiple Data Copies over Cloud Servers" 1 (1): 447-455, 2011
13 R. Curtmola, "MR-PDP: Multiple-replica provable data possession" 411-420, 2008
14 H. Wang, "Identity-based remote data possession checking in public clouds" 8 (8): 114-121, 2014
15 Y. Yu, "Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage" 12 (12): 767-778, 2016
16 J. Zhao, "Identity-based public verification with privacy-preserving for data storage security in cloud computing" 96 (96): 2709-2716, 2013
17 H. Wang, "Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud" 11 (11): 1165-1176, 2016
18 H Wang, "Identity-based distributed provable data possession in multicloud storage" 8 (8): 328-340, 2015
19 A. Shamir, "Identity-based cryptosystems and signature schemes" 47-53, 1984
20 J. Zhang, "IPad: ID-based public auditing for the outsourced data in the standard model" 19 (19): 127-138, 2016
21 Y. Yu, "Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage" 14 (14): 307-318, 2015
22 Q. Wang, "Enabling public verifiability and data dynamics for storage security in cloud computing" 355-370, 2009
23 J. Zhang, "Efficient public verification proof of retrievability scheme in cloud" 17 (17): 1401-1411, 2014
24 J. Zhang, "Efficient ID-based public auditing for the outsourced data in cloud storage" 343 : 1-14, 2016
25 C. C. Erway, "Dynamic provable data possession" 17 (17): 2015
26 Y. Zhu, "Dynamic audit services for integrity verication of outsourced storages in clouds" 1550-1557, 2011
27 Y. Zhu, "Cooperative provable data possession for integrity verification in multicloud storage" 23 (23): 2231-2244, 2012
28 Y. Yu, "Cloud data integrity checking with an identity-based auditing mechanism from RSA" 62 : 85-91, 2016
29 K. Yang, "An efficient and secure dynamic auditing protocol for data storage in cloud computing" 24 (24): 1717-1726, 2013
30 Chunxiang Xu, "An Efficient Provable Secure Public Auditing Scheme for Cloud Storage" 한국인터넷정보학회 8 (8): 4226-4241, 2014
31 Wenting Shen, "Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data" 한국인터넷정보학회 10 (10): 3319-3338, 2016