Related references
Note: Only part of the references are listed.Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing
Yinghui Zhang et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)
Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data
Yue Zhang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
Wenting Shen et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
A dynamic data security mechanism based on position aware Merkle tree for health rehabilitation services over cloud
S. Hariharasitaraman et al.
Journal of Ambient Intelligence and Humanized Computing (2019)
A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud
Praveen Kumar Premkamal et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)
Public auditing for shared cloud data with efficient and secure group management
Hui Tian et al.
INFORMATION SCIENCES (2019)
Privacy preserving cloud data auditing with efficient key update
Yannan Li et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Blockchain based efficient and robust fair payment for outsourcing services in cloud computing
Yinghui Zhang et al.
INFORMATION SCIENCES (2018)
Privacy-preserving auditing scheme for shared data in public clouds
Libing Wu et al.
JOURNAL OF SUPERCOMPUTING (2018)
Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium
Wenting Shen et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
Efficient privacy-preserving third-party auditing for ambient intelligence systems
Changsheng Wan et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2016)
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
Tao Jiang et al.
IEEE TRANSACTIONS ON COMPUTERS (2016)
Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud
Jiangtao Li et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability
Guangyang Yang et al.
JOURNAL OF SYSTEMS AND SOFTWARE (2016)
Dynamic Provable Data Possession
C. Chris Erway et al.
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2015)
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
Boyang Wang et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage
Yong Yu et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2015)
Secure and efficient privacy-preserving public auditing scheme for cloud storage
Solomon Guadie Worku et al.
COMPUTERS & ELECTRICAL ENGINEERING (2014)
ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things
Jinshu Su et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2014)
Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
Chang Liu et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
Security and privacy for storage and computation in cloud computing
Lifei Wei et al.
INFORMATION SCIENCES (2014)
A secure remote data integrity checking cloud storage system from threshold encryption
Chuan Yao et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2014)
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Boyang Wang et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2014)
Privacy-Preserving Public Auditing for Secure Cloud Storage
Cong Wang et al.
IEEE TRANSACTIONS ON COMPUTERS (2013)
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
Ayad Barsoum et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)
An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
Kan Yang et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)
Dynamic Audit Services for Outsourced Storages in Clouds
Yan Zhu et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2013)
Charm: a framework for rapidly prototyping cryptosystems
Joseph A. Akinyele et al.
JOURNAL OF CRYPTOGRAPHIC ENGINEERING (2013)
A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
Md. Tanzim Khorshed et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2012)
Security Challenges for the Public Cloud
Kui Ren et al.
IEEE INTERNET COMPUTING (2012)
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage
Yan Zhu et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)
A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
Zhuo Hao et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2011)
Short signatures from the Weil pairing
D Boneh et al.
JOURNAL OF CRYPTOLOGY (2004)