+

Park et al., 2018 - Google Patents

A symmetric key based deduplicatable proof of storage for encrypted data in cloud storage environments

Park et al., 2018

View PDF @Full View
Document ID
17860871083717215651
Author
Park C
Kim H
Hong D
Seo C
Publication year
Publication venue
Security and Communication Networks

External Links

Snippet

Over the recent years, cloud storage services have become increasingly popular, where users can outsource data and access the outsourced data anywhere, anytime. Accordingly, the data in the cloud is growing explosively. Among the outsourced data, most of them are …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • H04L9/0836Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure

Similar Documents

Publication Publication Date Title
Chen Using algebraic signatures to check data possession in cloud storage
Syam Kumar et al. An efficient and secure protocol for ensuring data storage security in cloud computing
Li et al. CSED: Client-side encrypted deduplication scheme based on proofs of ownership for cloud storage
Youn et al. Efficient client-side deduplication of encrypted data with public auditing in cloud storage
Zhang et al. Provable multiple replication data possession with full dynamics for secure cloud storage
Garg et al. Comparative analysis of cloud data integrity auditing protocols
CN105939191A (en) Client secure deduplication method of ciphertext data in cloud storage
Chen et al. Data dynamics for remote data possession checking in cloud storage
Guo et al. Dynamic proof of data possession and replication with tree sharing and batch verification in the cloud
Wen et al. BDO-SD: An efficient scheme for big data outsourcing with secure deduplication
Ma et al. CP‐ABE‐based secure and verifiable data deletion in cloud
Kumar et al. Data outsourcing: A threat to confidentiality, integrity, and availability
Agarwala et al. DICE: A dual integrity convergent encryption protocol for client side secure data deduplication
Kim et al. Client‐Side Deduplication to Enhance Security and Reduce Communication Costs
Li et al. A Blockchain‐Based Public Auditing Protocol with Self‐Certified Public Keys for Cloud Data
Chen et al. Message‐locked proof of ownership and retrievability with remote repairing in cloud
Kang et al. Attack on Privacy‐Preserving Public Auditing Schemes for Cloud Storage
Vasilopoulos et al. Message-locked proofs of retrievability with secure deduplication
Ha et al. A secure deduplication scheme based on data popularity with fully random tags
Abo‐alian et al. Integrity as a service for replicated data on the cloud
Xu et al. Leakage-resilient client-side deduplication of encrypted data in cloud storage
Yoosuf et al. FogDedupe: A Fog‐Centric Deduplication Approach Using Multi‐Key Homomorphic Encryption Technique
Wei et al. Dynamic data integrity auditing for secure outsourcing in the cloud
Tang et al. Aggregation‐Based Tag Deduplication for Cloud Storage with Resistance against Side Channel Attack
Sun et al. Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载