Yu et al., 2016 - Google Patents
An efficient public auditing scheme for cloud storage serverYu et al., 2016
View PDF- Document ID
- 737684864122534592
- Author
- Yu H
- Cai Y
- Kong S
- Publication year
- Publication venue
- 2016 International Conference on Advanced Electronic Science and Technology (AEST 2016)
External Links
Snippet
Storing data in cloud storage servers is a new trend with the development of 05 Cloud computing. Cloud storage brings lots of benefits and allows cloud users to access their data from any device. However, it also brings security challenges. Cloud user loses its control on …
- 241000626572 Xanthomonas oryzae pv. oryzicola 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Li et al. | Identity-based privacy preserving remote data integrity checking for cloud storage | |
| Fu et al. | NPP: A new privacy-aware public auditing scheme for cloud data sharing with group users | |
| Yang et al. | Provable data possession of resource-constrained mobile devices in cloud computing | |
| Wang et al. | Oruta: Privacy-preserving public auditing for shared data in the cloud | |
| Zhang et al. | SCLPV: Secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors | |
| Luo et al. | Ensuring the data integrity in cloud data storage | |
| Yu et al. | On the security of auditing mechanisms for secure cloud storage | |
| He et al. | Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage | |
| CN109286490A (en) | Method and system for deduplication and integrity verification of encrypted data | |
| Yan et al. | Integrity audit of shared cloud data with identity tracking | |
| Malina et al. | Efficient security solution for privacy-preserving cloud services | |
| Song et al. | LSDedup: Layered secure deduplication for cloud storage | |
| Huang et al. | Privacy-preserving public auditing for non-manager group | |
| Zhang et al. | Blockchain-Based Privacy-Preserving Deduplication and Integrity Auditing in Cloud Storage | |
| Xia et al. | An Improved Privacy Preserving Construction for Data Integrity Verification in Cloud Storage. | |
| Mishra et al. | MPoWS: Merged proof of ownership and storage for block level deduplication in cloud storage | |
| He et al. | Public auditing for encrypted data with client-side deduplication in cloud storage | |
| Yu et al. | An efficient public auditing scheme for cloud storage server | |
| Navajothi et al. | An efficient, dynamic, privacy preserving public auditing method on untrusted cloud storage | |
| He et al. | Identity-preserving public auditing for shared cloud data | |
| Ren et al. | Attributed based provable data possession in public cloud storage | |
| Yang et al. | A Security Enhanced Blockchain System Supporting Standard Elliptic Curve Digital Signature Algorithm Signature (ECDSA) and SM2 Signature Simultaneously | |
| Jiang et al. | The Weakness of One Blockchain-assisted Authentication and Key Agreement Scheme for Fog-based Smart Grid | |
| Shen et al. | Access-authorizing and privacy-preserving auditing with group dynamic for shared cloud data. | |
| Jiang et al. | An efficient privacy-preserving scheme for weak password collection in Internet of Things |