Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 269357, 12 pages
http://dx.doi.org/10.1155/2014/269357
Research Article

Towards Dynamic Remote Data Auditing in Computational Clouds

1Center for Mobile Cloud Computing Research (C4MCCR), University of Malaya, 50603 Kuala Lumpur, Malaysia
2Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh 92144, Saudi Arabia
3Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, 50603 Kuala Lumpur, Malaysia

Received 14 March 2014; Accepted 8 May 2014; Published 9 July 2014

Academic Editor: Fei Yu

Copyright © 2014 Mehdi Sookhak et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [9 citations]

The following is the list of published articles that have cited the current article.

  • Mehdi Sookhak, Abdullah Gani, Hamid Talebian, Adnan Akhunzada, Samee U. Khan, Rajkumar Buyya, and Albert Y. Zomaya, “Remote Data Auditing in Cloud Computing Environments,” ACM Computing Surveys, vol. 47, no. 4, pp. 1–34, 2015. View at Publisher · View at Google Scholar
  • Adnan Akhunzada, Abdullah Gani, Nor Badrul Anuar, Ahmad Aziz, Muhammad Khurram Khan, Amir Hayat, and Samee U. Khan, “Secure and Dependable Software Defined Networks,” Journal of Network and Computer Applications, 2015. View at Publisher · View at Google Scholar
  • Mehdi Sookhak, F. Richard Yu, Muhammad Khurram Khan, Yang Xiang, and Rajkumar Buyya, “Attribute-based data access control in mobile cloud computing: Taxonomy and open issues,” Future Generation Computer Systems, 2016. View at Publisher · View at Google Scholar
  • Alshaimaa Abo-alian, Nagwa L. Badr, and M. F. Tolba, “Integrity as a service for replicated data on the cloud,” Concurrency and Computation: Practice and Experience, 2016. View at Publisher · View at Google Scholar
  • Mehdi Sookhak, F. Richard Yu, and Helen Tang, “Secure Data Sharing for Vehicular Ad-hoc Networks Using Cloud Computing,” Ad Hoc Networks, vol. 184, pp. 306–315, 2016. View at Publisher · View at Google Scholar
  • Suleman Khan, Ahmed Abdelaziz, Tan Fong Ang, Mehdi Sookhak, Athanasios Vasilakos, Chee Sun Liew, and Adnan Akhunzada, “Survey on network virtualization using openflow: Taxonomy, opportunities, and open issues,” KSII Transactions on Internet and Information Systems, vol. 10, no. 10, pp. 4902–4932, 2016. View at Publisher · View at Google Scholar
  • Haiyang Yu, Yongquan Cai, Shanshan Kong, Fei Xue, and Ditta Allah, “An efficient public auditing scheme for multi-cloud storage,” International Journal of Security and its Applications, vol. 10, no. 12, pp. 81–96, 2016. View at Publisher · View at Google Scholar
  • Shanshan Kong, Haiyang Yu, Yongquan Cai, Zhenhu Ning, Fei Xue, and Han Zhong, “Efficient and secure identity-based public auditing for dynamic outsourced data with proxy,” KSII Transactions on Internet and Information Systems, vol. 11, no. 10, pp. 5039–5061, 2017. View at Publisher · View at Google Scholar
  • Haiyang Yu, Yongquan Cai, Gulzar Rana Khurram, Fei Xue, and Shanshan Kong, “Efficient public auditing for data migration across cloud systems,” International Journal of Wireless and Mobile Computing, vol. 12, no. 1, pp. 41–48, 2017. View at Publisher · View at Google Scholar