Yu et al., 2015 - Google Patents
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storageYu et al., 2015
View PDF- Document ID
- 16295259793382307616
- Author
- Yu Y
- Au M
- Mu Y
- Tang S
- Ren J
- Susilo W
- Dong L
- Publication year
- Publication venue
- International Journal of Information Security
External Links
Snippet
Remote data integrity checking (RDIC) enables a server to prove to an auditor the integrity of a stored file. It is a useful technology for remote storage such as cloud storage. The auditor could be a party other than the data owner; hence, an RDIC proof is based usually on …
- 238000005516 engineering process 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Yu et al. | Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage | |
| Zhao et al. | Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems | |
| Huang et al. | Blockchain-based multiple groups data sharing with anonymity and traceability | |
| Yu et al. | Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage | |
| Xu et al. | Blockchain empowered arbitrable data auditing scheme for network storage as a service | |
| Yu et al. | Attribute-based cloud data integrity auditing for secure outsourced storage | |
| Yu et al. | Strong key-exposure resilient auditing for secure cloud storage | |
| Li et al. | Fuzzy identity-based data integrity auditing for reliable cloud storage systems | |
| Wei et al. | SecCloud: Bridging secure storage and computation in cloud | |
| Worku et al. | Secure and efficient privacy-preserving public auditing scheme for cloud storage | |
| Wei et al. | Security and privacy for storage and computation in cloud computing | |
| Choi et al. | Multi-client non-interactive verifiable computation | |
| Groth et al. | Cryptography in the multi-string model | |
| Brickell et al. | Enhanced privacy ID from bilinear pairing for hardware authentication and attestation | |
| Yang et al. | Provable data possession of resource-constrained mobile devices in cloud computing | |
| JP6016948B2 (en) | Secret calculation system, arithmetic device, secret calculation method, and program | |
| Sun et al. | Outsourced decentralized multi-authority attribute based signature and its application in IoT | |
| Hohenberger et al. | ANONIZE: A large-scale anonymous survey system | |
| Luo et al. | An effective integrity verification scheme of cloud data based on BLS signature | |
| Mishra et al. | Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment | |
| Huang et al. | Privacy-preserving public auditing for non-manager group shared data | |
| Liu et al. | Identity-based provable data possession revisited: Security analysis and generic construction | |
| Hu et al. | Secure outsourced computation of the characteristic polynomial and eigenvalues of matrix | |
| Kuykendall et al. | Cryptography for# metoo | |
| Zhu et al. | Secure collaborative integrity verification for hybrid cloud environments |