A. Juels, J. Burton, and S. Kalis-i, Pors, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.584-97, 2007.
DOI : 10.1145/1315245.1315317

G. Ateniese, Prova le Data Possession at Untrusted Stores, Proc. ACM CCS '07, pp.598-609, 2007.
DOI : 10.1145/1315245.1315318

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.299.311

S. Kumar and A. Saxena, Data integrity proofs in cloud storage, proc. COMSNETS'11, pp.1-4, 2011.

Z. Jianhong and C. Hua, Secuirty storage in the Cloud Computing: A RSA-based assumption data integrity check without original data, 2010 International Conference on Educational and Information Technology, pp.17-19, 2010.
DOI : 10.1109/ICEIT.2010.5607505

S. Nepal, J. Shiping-chen, . Yao, and D. Thilakanathan, DIaaS: Data Integrity as a Service in the Cloud, 2011 IEEE 4th International Conference on Cloud Computing, pp.308-315, 2011.
DOI : 10.1109/CLOUD.2011.35

W. Qian, W. Cong, and L. Jin, Ena ling pu lic verifia ility and data dynamics for storage security in cloud computing, Lecture Notes in Computer Science, vol.5789, pp.355-370, 2009.