References: [1] Ateniese, G., Burns, R. C., Curtmola, R.J. Herring, L. Kissner,Z. N. J. Peterson, and D. X. Song, Provable data possession at untrusted stores, In: ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F.Syverson, Eds. ACM, 2007, p. 598–609. [2] Juels, A., Jr, B. S. K. (2007). Pors: proofs of retrievability for large files, in ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, p. 584–597. [3] Kan Yang and XiaohuaJia., TSAS: Third-Party Storage Auditing Service, In: Security for Cloud Storage Systems,SpringerBriefs in Computer Science 2014, p 7-37. [4] Venkat Rao, K., AvalaAtchyutaRao. (2013). Data Integrity in Multi Cloud Storage, International Journal of Science Engineering and Advance Technology, 1 (7) 2013. [5] Ateniese, G., Di Pietro, R., Mancini, L. V., Tsudik, G. (2008). Scalable and efficient provable data possession, in Secure Comm ’08: In: Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, New York, NY, USA, 2008, p 1–10. [6] Wang, Q., Wang, C., Li, J., Ren, K., Lou, W. (2009). Enabling public verifiability and data dynamics for storage security in cloud computing, In: ESORICS’09: Proceedings of the 14th European Conference on Research in Computer Security, Berlin, Heidelberg, 2009, 355–370. [7] Cloud Security Alliance. (2010). Top Threats to Cloud Computing. [Online]. Available: http://www.cloudsecurityalliance.org |