References
[1]. A. Juels and B.S. Kaliski Jr, (2007). “oRs: Proofs of
th Retrievability for Large Files”. In Proc. 14 ACM Conf.
Comput. Commun. Security, pp. 584-597.
[2]. H. Shacham and B. Waters, (2008). “Compact proofs
th of retrievability”. In Proc. 14 Int. Conf. Theory Appl.
Cryptol. Inf. Security, pp. 90-107.
[3]. K.D. Bowers, A. Juels, and A. Oprea, (2009). “Proofs of
retrievability: Theory and implementation”. In Proc. ACM
Workshop Cloud Comput. Security, pp. 43-54.
[4]. H. Li, B. Wang, and B. Li, (2014). “Oruta: Privacypreserving
public auditing for shared data in the cloud”.
IEEE Trans. Cloud Comput., Vol. 2, No. 1, pp. 43-56.
[5]. J. Li, X. Tan, X. Chen, and D.S. Wong, (2013). “An
efficient proof of retrievability with public auditing in cloud
th computing”. In Proc. 5 Int. Conf. Intell. Netw.
Collaborative Syst., pp. 93-98.
[6]. C. Wang, Q. Wang, and K. Ren, (2009). “Ensuring data
th storage security in cloud computing”. In Proc. 17 Int.
Workshop Quality Serv., pp. 1-9.
[7]. Q. Zheng, and S. Xu, (2012). “Secure and efficient
proof of storage with deduplication”. In Proc. ACM Conf. Data Appl.Security Privacy, pp. 1-12.
[8]. C. Erway, A. Kupcu, C. Papamanthou, and R.
Tamassia, (2008). “Dynamic provable data possession”.
Cryptology ePrint Archive, Report 2008/432 [Online].
Retrieved from http://eprint.iacr.org
[9]. S. Maria Celestin Vigila, K. Muneeswaran, (2011).
“Elliptic curve based key generation for symmetric
encryption”. In ICSCCN International IEEE Conference,
pp. 824-829.
[10]. Don Johnson, Alfred Menezes and Scott Vanstone,
(2001). “The Elliptic Curve Digital Signature Algorithm
(ECDSA)”. Certicom Research, Canada. Dept. of
Combinatorics & Optimization, University of Waterloo,
Canada.
[11]. Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S.Womg
nad Fatos Xhafa, (2015). “OPoR: Enabling Proof of
Retrievability in Cloud Computing with Resource-
Constrained Devices”. IEEE Transaction on Cloud
Computing, Vol. 3, No. 2.
[12]. R.C. Merkle, (1980). “Protocols for public key
cryptosystems”. In Proc. IEEE Symp. Security Privacy, pp.
122-133.
[13]. K. Ramesh, and S. Ramesh, (2014). “Implementing
OneTimePassword based security mechanism for
securing personal health records in cloud”. In ICCICCT
International IEEE Conference, pp. 968-972.
[14]. Yuan-Bin Xie, Pei-Jun Ma, Jiang-Yi Shi, Kang Li, Xiao-
Feng Yang, and Yue Hao, (2010). “High-speed and
flexible elliptic curve cryptographic processor for general
th prime fields”. In ICSICT IEEE 10 International Conference,
pp. 503-505.
[15]. The OpenSSL Project. Retrieved from http://www.
openssl.org/.
[16]. Mahesh S. Giri, (2015). “A Survey on Data Integrity
Techniques in Cloud Computing”. International Journal of
Computer Applications (0975 – 8887) Vol. 122, No. 2.
[17]. Hero Modares, Amirhossein Moravejosharieh, and
Rosli Salleh, (2011). “Wireless Network Security Using
Elliptic Cur ve Cr yptography ”. Informatics and
Computational Intelligence (ICI), 2011 First International
Conference on, pp. 348 - 351, DOI: 10.1109/ICI. 2011.63
[18]. S.V. Divya, and R.S. Shaji, (2014). “Security in data
forwarding through elliptic curve cryptography in cloud”.
Control, Instrumentation, Communication and
Computational Technologies (ICCICCT), 2014
International Conference, pp.1083 - 1088, DOI: 10.1109/
ICCICCT. 2014.6993122
[19]. Haichun Zhao, and Xuefeng Zheng, (2015). “A
Survey on the Integrity Checking of Outsourced Data in
th Cloud Computing”. 2015 IEEE 12 Intl Conf on Ubiquitous
th Intelligence and Computing and 2015 IEEE 12 Intl Conf
th on Autonomic and Trusted Computing and 2015 IEEE 15
Intl Conf on Scalable Computing and Communications
and Its Associated Workshops (UIC-ATC-ScalCom), pp.
1650 - 1656, DOI: 10.1109/ UIC-ATC-ScalCom-CBDCom-
IoP.2015.300.
[20]. Trushna S. Khatri, and G.B Jethava, (2013).
“Improving dynamic data integrity verification in cloud
computing”. Computing, Communications and
Networking Technologies (ICCCNT), 2013 Fourth
International Conference on Year: 2013, pp. 1 - 6, DOI:
10.1109/ ICCCNT.2013.6726483