+

Yu et al., 2016 - Google Patents

An efficient public auditing scheme for cloud storage server

Yu et al., 2016

View PDF
Document ID
737684864122534592
Author
Yu H
Cai Y
Kong S
Publication year
Publication venue
2016 International Conference on Advanced Electronic Science and Technology (AEST 2016)

External Links

Snippet

Storing data in cloud storage servers is a new trend with the development of 05 Cloud computing. Cloud storage brings lots of benefits and allows cloud users to access their data from any device. However, it also brings security challenges. Cloud user loses its control on …
Continue reading at www.atlantis-press.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Similar Documents

Publication Publication Date Title
Li et al. Identity-based privacy preserving remote data integrity checking for cloud storage
Fu et al. NPP: A new privacy-aware public auditing scheme for cloud data sharing with group users
Yang et al. Provable data possession of resource-constrained mobile devices in cloud computing
Wang et al. Oruta: Privacy-preserving public auditing for shared data in the cloud
Zhang et al. SCLPV: Secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors
Luo et al. Ensuring the data integrity in cloud data storage
Yu et al. On the security of auditing mechanisms for secure cloud storage
He et al. Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage
CN109286490A (en) Method and system for deduplication and integrity verification of encrypted data
Yan et al. Integrity audit of shared cloud data with identity tracking
Malina et al. Efficient security solution for privacy-preserving cloud services
Song et al. LSDedup: Layered secure deduplication for cloud storage
Huang et al. Privacy-preserving public auditing for non-manager group
Zhang et al. Blockchain-Based Privacy-Preserving Deduplication and Integrity Auditing in Cloud Storage
Xia et al. An Improved Privacy Preserving Construction for Data Integrity Verification in Cloud Storage.
Mishra et al. MPoWS: Merged proof of ownership and storage for block level deduplication in cloud storage
He et al. Public auditing for encrypted data with client-side deduplication in cloud storage
Yu et al. An efficient public auditing scheme for cloud storage server
Navajothi et al. An efficient, dynamic, privacy preserving public auditing method on untrusted cloud storage
He et al. Identity-preserving public auditing for shared cloud data
Ren et al. Attributed based provable data possession in public cloud storage
Yang et al. A Security Enhanced Blockchain System Supporting Standard Elliptic Curve Digital Signature Algorithm Signature (ECDSA) and SM2 Signature Simultaneously
Jiang et al. The Weakness of One Blockchain-assisted Authentication and Key Agreement Scheme for Fog-based Smart Grid
Shen et al. Access-authorizing and privacy-preserving auditing with group dynamic for shared cloud data.
Jiang et al. An efficient privacy-preserving scheme for weak password collection in Internet of Things
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载