+

Yu et al., 2015 - Google Patents

Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage

Yu et al., 2015

View PDF
Document ID
16295259793382307616
Author
Yu Y
Au M
Mu Y
Tang S
Ren J
Susilo W
Dong L
Publication year
Publication venue
International Journal of Information Security

External Links

Snippet

Remote data integrity checking (RDIC) enables a server to prove to an auditor the integrity of a stored file. It is a useful technology for remote storage such as cloud storage. The auditor could be a party other than the data owner; hence, an RDIC proof is based usually on …
Continue reading at www.egr.msu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Similar Documents

Publication Publication Date Title
Yu et al. Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage
Zhao et al. Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems
Huang et al. Blockchain-based multiple groups data sharing with anonymity and traceability
Yu et al. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage
Xu et al. Blockchain empowered arbitrable data auditing scheme for network storage as a service
Yu et al. Attribute-based cloud data integrity auditing for secure outsourced storage
Yu et al. Strong key-exposure resilient auditing for secure cloud storage
Li et al. Fuzzy identity-based data integrity auditing for reliable cloud storage systems
Wei et al. SecCloud: Bridging secure storage and computation in cloud
Worku et al. Secure and efficient privacy-preserving public auditing scheme for cloud storage
Wei et al. Security and privacy for storage and computation in cloud computing
Choi et al. Multi-client non-interactive verifiable computation
Groth et al. Cryptography in the multi-string model
Brickell et al. Enhanced privacy ID from bilinear pairing for hardware authentication and attestation
Yang et al. Provable data possession of resource-constrained mobile devices in cloud computing
JP6016948B2 (en) Secret calculation system, arithmetic device, secret calculation method, and program
Sun et al. Outsourced decentralized multi-authority attribute based signature and its application in IoT
Hohenberger et al. ANONIZE: A large-scale anonymous survey system
Luo et al. An effective integrity verification scheme of cloud data based on BLS signature
Mishra et al. Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment
Huang et al. Privacy-preserving public auditing for non-manager group shared data
Liu et al. Identity-based provable data possession revisited: Security analysis and generic construction
Hu et al. Secure outsourced computation of the characteristic polynomial and eigenvalues of matrix
Kuykendall et al. Cryptography for# metoo
Zhu et al. Secure collaborative integrity verification for hybrid cloud environments
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载