+

Hao et al., 2011 - Google Patents

A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability

Hao et al., 2011

View PDF
Document ID
6251876984421288950
Author
Hao Z
Zhong S
Yu N
Publication year
Publication venue
IEEE transactions on Knowledge and Data Engineering

External Links

Snippet

Remote data integrity checking is a crucial technology in cloud computing. Recently, many works focus on providing data dynamics and/or public verifiability to this type of protocols. Existing protocols can support both features with the help of a third-party auditor. In a …
Continue reading at coggsworth.cse.buffalo.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Hao et al. A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
Yu et al. Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage
Yu et al. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage
Sookhak et al. Auditing big data storage in cloud computing using divide and conquer tables
Brickell et al. Enhanced privacy ID from bilinear pairing for hardware authentication and attestation
Chen Using algebraic signatures to check data possession in cloud storage
Li et al. CSED: Client-side encrypted deduplication scheme based on proofs of ownership for cloud storage
Khedr et al. Cryptographic accumulator-based scheme for critical data integrity verification in cloud storage
CN108965258A (en) A kind of cloud environment data integrity verification method based on full homomorphic cryptography
KR20210017432A (en) Apparatus and method for managing personal information based on blockchain
Chen et al. Data dynamics for remote data possession checking in cloud storage
Zhao et al. Distributed machine learning oriented data integrity verification scheme in cloud computing environment
Zhang et al. Secure and efficient data deduplication in jointcloud storage
Yin et al. Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data
Liu et al. Identity-based provable data possession revisited: Security analysis and generic construction
Meng et al. Fast secure and anonymous key agreement against bad randomness for cloud computing
Wang et al. Privacy-preserving time-based auditing for secure cloud storage
Kundu et al. Efficient leakage-free authentication of trees, graphs and forests
Zhou et al. PVOPM: Verifiable privacy-preserving pattern matching with efficient outsourcing in the malicious setting
Brickell et al. A (corrected) DAA scheme using batch proof and verification
Yuan et al. Efficient and verifiable proof of replication with fast fault localization
Xu et al. KCRS: a blockchain-based key compromise resilient signature system
Zhou A Certificate‐Based Provable Data Possession Scheme in the Standard Model
Saxena et al. On-demand Integrity Verification Technique for Cloud Data Storage.
CN110958116B (en) A multi-copy cloud data integrity audit method based on lattice signature
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载