4.2 Article

Attribute-based public integrity auditing for shared data with efficient user revocation in cloud storage

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing

Yinghui Zhang et al.

Summary: Cloud computing is a milestone in the development of outsourcing services, but trust issues between users and providers may impede its wide adoption. BPay, a blockchain-based outsourcing service fair payment framework, ensures secure and fair payment without relying on any third party.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)

Article Computer Science, Hardware & Architecture

Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data

Yue Zhang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Theory & Methods

Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage

Wenting Shen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article

A dynamic data security mechanism based on position aware Merkle tree for health rehabilitation services over cloud

S. Hariharasitaraman et al.

Journal of Ambient Intelligence and Humanized Computing (2019)

Article Computer Science, Artificial Intelligence

A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud

Praveen Kumar Premkamal et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)

Article Computer Science, Information Systems

Public auditing for shared cloud data with efficient and secure group management

Hui Tian et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Theory & Methods

Privacy preserving cloud data auditing with efficient key update

Yannan Li et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

Blockchain based efficient and robust fair payment for outsourcing services in cloud computing

Yinghui Zhang et al.

INFORMATION SCIENCES (2018)

Article Computer Science, Hardware & Architecture

Privacy-preserving auditing scheme for shared data in public clouds

Libing Wu et al.

JOURNAL OF SUPERCOMPUTING (2018)

Article Computer Science, Hardware & Architecture

Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium

Wenting Shen et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Artificial Intelligence

Efficient privacy-preserving third-party auditing for ambient intelligence systems

Changsheng Wan et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2016)

Article Computer Science, Hardware & Architecture

Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation

Tao Jiang et al.

IEEE TRANSACTIONS ON COMPUTERS (2016)

Article Computer Science, Theory & Methods

Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud

Jiangtao Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Software Engineering

Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability

Guangyang Yang et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2016)

Article Computer Science, Information Systems

Dynamic Provable Data Possession

C. Chris Erway et al.

ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2015)

Article Computer Science, Information Systems

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Boyang Wang et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)

Article Computer Science, Information Systems

Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage

Yong Yu et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2015)

Article Computer Science, Hardware & Architecture

Secure and efficient privacy-preserving public auditing scheme for cloud storage

Solomon Guadie Worku et al.

COMPUTERS & ELECTRICAL ENGINEERING (2014)

Article Computer Science, Theory & Methods

ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things

Jinshu Su et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2014)

Article Computer Science, Theory & Methods

Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates

Chang Liu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Information Systems

Security and privacy for storage and computation in cloud computing

Lifei Wei et al.

INFORMATION SCIENCES (2014)

Article Computer Science, Artificial Intelligence

A secure remote data integrity checking cloud storage system from threshold encryption

Chuan Yao et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2014)

Article Computer Science, Information Systems

Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

Boyang Wang et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2014)

Article Computer Science, Hardware & Architecture

Privacy-Preserving Public Auditing for Secure Cloud Storage

Cong Wang et al.

IEEE TRANSACTIONS ON COMPUTERS (2013)

Article Computer Science, Theory & Methods

Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems

Ayad Barsoum et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Theory & Methods

An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing

Kan Yang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Information Systems

Dynamic Audit Services for Outsourced Storages in Clouds

Yan Zhu et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2013)

Article Computer Science, Theory & Methods

Charm: a framework for rapidly prototyping cryptosystems

Joseph A. Akinyele et al.

JOURNAL OF CRYPTOGRAPHIC ENGINEERING (2013)

Article Computer Science, Theory & Methods

A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing

Md. Tanzim Khorshed et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2012)

Article Computer Science, Software Engineering

Security Challenges for the Public Cloud

Kui Ren et al.

IEEE INTERNET COMPUTING (2012)

Article Computer Science, Theory & Methods

Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage

Yan Zhu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)

Article Computer Science, Artificial Intelligence

A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability

Zhuo Hao et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2011)

Article Computer Science, Theory & Methods

Short signatures from the Weil pairing

D Boneh et al.

JOURNAL OF CRYPTOLOGY (2004)