Park et al., 2018 - Google Patents
A symmetric key based deduplicatable proof of storage for encrypted data in cloud storage environmentsPark et al., 2018
View PDF- Document ID
- 17860871083717215651
- Author
- Park C
- Kim H
- Hong D
- Seo C
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
Over the recent years, cloud storage services have become increasingly popular, where users can outsource data and access the outsourced data anywhere, anytime. Accordingly, the data in the cloud is growing explosively. Among the outsourced data, most of them are …
- 238000000034 method 0 description 25
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Chen | Using algebraic signatures to check data possession in cloud storage | |
| Syam Kumar et al. | An efficient and secure protocol for ensuring data storage security in cloud computing | |
| Li et al. | CSED: Client-side encrypted deduplication scheme based on proofs of ownership for cloud storage | |
| Youn et al. | Efficient client-side deduplication of encrypted data with public auditing in cloud storage | |
| Zhang et al. | Provable multiple replication data possession with full dynamics for secure cloud storage | |
| Garg et al. | Comparative analysis of cloud data integrity auditing protocols | |
| CN105939191A (en) | Client secure deduplication method of ciphertext data in cloud storage | |
| Chen et al. | Data dynamics for remote data possession checking in cloud storage | |
| Guo et al. | Dynamic proof of data possession and replication with tree sharing and batch verification in the cloud | |
| Wen et al. | BDO-SD: An efficient scheme for big data outsourcing with secure deduplication | |
| Ma et al. | CP‐ABE‐based secure and verifiable data deletion in cloud | |
| Kumar et al. | Data outsourcing: A threat to confidentiality, integrity, and availability | |
| Agarwala et al. | DICE: A dual integrity convergent encryption protocol for client side secure data deduplication | |
| Kim et al. | Client‐Side Deduplication to Enhance Security and Reduce Communication Costs | |
| Li et al. | A Blockchain‐Based Public Auditing Protocol with Self‐Certified Public Keys for Cloud Data | |
| Chen et al. | Message‐locked proof of ownership and retrievability with remote repairing in cloud | |
| Kang et al. | Attack on Privacy‐Preserving Public Auditing Schemes for Cloud Storage | |
| Vasilopoulos et al. | Message-locked proofs of retrievability with secure deduplication | |
| Ha et al. | A secure deduplication scheme based on data popularity with fully random tags | |
| Abo‐alian et al. | Integrity as a service for replicated data on the cloud | |
| Xu et al. | Leakage-resilient client-side deduplication of encrypted data in cloud storage | |
| Yoosuf et al. | FogDedupe: A Fog‐Centric Deduplication Approach Using Multi‐Key Homomorphic Encryption Technique | |
| Wei et al. | Dynamic data integrity auditing for secure outsourcing in the cloud | |
| Tang et al. | Aggregation‐Based Tag Deduplication for Cloud Storage with Resistance against Side Channel Attack | |
| Sun et al. | Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation |