Hao et al., 2011 - Google Patents
A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiabilityHao et al., 2011
View PDF- Document ID
- 6251876984421288950
- Author
- Hao Z
- Zhong S
- Yu N
- Publication year
- Publication venue
- IEEE transactions on Knowledge and Data Engineering
External Links
Snippet
Remote data integrity checking is a crucial technology in cloud computing. Recently, many works focus on providing data dynamics and/or public verifiability to this type of protocols. Existing protocols can support both features with the help of a third-party auditor. In a …
- 238000004458 analytical method 0 abstract description 10
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hao et al. | A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability | |
| Yu et al. | Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage | |
| Yu et al. | Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage | |
| Sookhak et al. | Auditing big data storage in cloud computing using divide and conquer tables | |
| Brickell et al. | Enhanced privacy ID from bilinear pairing for hardware authentication and attestation | |
| Chen | Using algebraic signatures to check data possession in cloud storage | |
| Li et al. | CSED: Client-side encrypted deduplication scheme based on proofs of ownership for cloud storage | |
| Khedr et al. | Cryptographic accumulator-based scheme for critical data integrity verification in cloud storage | |
| CN108965258A (en) | A kind of cloud environment data integrity verification method based on full homomorphic cryptography | |
| KR20210017432A (en) | Apparatus and method for managing personal information based on blockchain | |
| Chen et al. | Data dynamics for remote data possession checking in cloud storage | |
| Zhao et al. | Distributed machine learning oriented data integrity verification scheme in cloud computing environment | |
| Zhang et al. | Secure and efficient data deduplication in jointcloud storage | |
| Yin et al. | Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data | |
| Liu et al. | Identity-based provable data possession revisited: Security analysis and generic construction | |
| Meng et al. | Fast secure and anonymous key agreement against bad randomness for cloud computing | |
| Wang et al. | Privacy-preserving time-based auditing for secure cloud storage | |
| Kundu et al. | Efficient leakage-free authentication of trees, graphs and forests | |
| Zhou et al. | PVOPM: Verifiable privacy-preserving pattern matching with efficient outsourcing in the malicious setting | |
| Brickell et al. | A (corrected) DAA scheme using batch proof and verification | |
| Yuan et al. | Efficient and verifiable proof of replication with fast fault localization | |
| Xu et al. | KCRS: a blockchain-based key compromise resilient signature system | |
| Zhou | A Certificate‐Based Provable Data Possession Scheme in the Standard Model | |
| Saxena et al. | On-demand Integrity Verification Technique for Cloud Data Storage. | |
| CN110958116B (en) | A multi-copy cloud data integrity audit method based on lattice signature |