4.7 Article

Blockchain-based random auditor committee for integrity verification

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Security-Aware Collaboration Plan Recommendation for Dynamic Multiple Workflow Processes

Yanhua Du et al.

Summary: Currently, recommending secure collaboration plans for multiple workflow processes with dynamic relations has become a hot topic, as it can reduce risks during execution and prevent financial losses caused by security breaches. However, existing methods fail to solve the parametric problem caused by dynamic relations or recommend optimal collaboration plans due to erroneous information. This article proposes a new approach to recommend security-aware collaboration plans for multiple workflow processes with dynamic relations.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Theory & Methods

zkrpChain: Towards multi-party privacy-preserving data auditing for consortium blockchains based on zero-knowledge range proofs

Shiwei Xu et al.

Summary: zkrpChain is a solution that focuses on protecting the integrity and privacy of data uploaded by blockchain members, supporting zero-knowledge range proofs generation and verification, improving efficiency, and expanding application scenarios.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2022)

Article Computer Science, Information Systems

Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage

Anjia Yang et al.

Summary: Cloud storage is widely used nowadays, alleviating the burden of local data storage. Ensuring the security and integrity of outsourced data in the cloud has attracted significant attention. Proofs of storage (POS) address this issue, with publicly verifiable POS improving scalability by allowing third-party verification. The proposed Delegatable Proofs of Storage (DPOS) scheme provides efficient tag generation, supporting dynamic operations with high efficiency while maintaining soundness and privacy protection.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)

Article Computer Science, Theory & Methods

DR-BFT: A consensus algorithm for blockchain-based multi-layer data integrity framework in dynamic edge computing system

Yuqi Fan et al.

Summary: Edge computing, as a part of distributed computing architecture, expands cloud capacity by storing and processing data at the network edge, closer to the data source. This paper introduces a two-layer blockchain framework and a novel DR-BFT consensus algorithm to ensure data integrity in edge computing, along with an improved Byzantine fault tolerance algorithm. The proposed consensus algorithm effectively improves performance in dynamic edge computing, including communication overhead and consensus latency.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)

Article Computer Science, Theory & Methods

BOSSA: A Decentralized System for Proofs of Data Retrievability and Replication

Dian Chen et al.

Summary: The proposed decentralized system BOSSA provides an incentive mechanism for all parties involved in data retrievability and replication, with automated auditing on blockchain platforms. Security is given full consideration, along with privacy-enhancing techniques to prevent data leakage.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2021)

Article Computer Science, Information Systems

Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors

Yuan Zhang et al.

Summary: The deployment of cloud storage services brings significant benefits in data management for users, but also raises security issues, such as data integrity. Public verification techniques can help users employ third-party auditors to verify data integrity, but existing schemes are vulnerable to procrastinating auditors. CPVPA is a certificateless public verification scheme using blockchain technology to address this issue, requiring auditors to record verification results in transactions on the blockchain.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)

Article Computer Science, Hardware & Architecture

RepuCoin: Your Reputation Is Your Power

Jiangshan Yu et al.

IEEE TRANSACTIONS ON COMPUTERS (2019)

Article Automation & Control Systems

Anonymous Reputation System for IIoT-Enabled Retail Marketing Atop PoS Blockchain

Dongxiao Liu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Proceedings Paper Computer Science, Information Systems

Poster: A Proof-of-Stake (PoS) Blockchain Protocol using Fair and Dynamic Sharding Management

Daehwa Rayer Lee et al.

PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)

Proceedings Paper Computer Science, Information Systems

Flexible Byzantine Fault Tolerance

Dahlia Malkhi et al.

PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)

Proceedings Paper Computer Science, Software Engineering

Algorand: Scaling Byzantine Agreements for Cryptocurrencies

Yossi Gilad et al.

PROCEEDINGS OF THE TWENTY-SIXTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES (SOSP '17) (2017)

Article Computer Science, Theory & Methods

Secure searching on cloud storage enhanced by homomorphic indexing

Shu Qin Ren et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)

Article Computer Science, Cybernetics

SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors

Yuan Zhang et al.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2015)

Article Engineering, Electrical & Electronic

Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor

Kun Huang et al.

IET COMMUNICATIONS (2014)

Article Computer Science, Theory & Methods

Using algebraic signatures to check data possession in cloud storage

Lanxiang Chen

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2013)

Article Computer Science, Hardware & Architecture

Privacy-Preserving Public Auditing for Secure Cloud Storage

Cong Wang et al.

IEEE TRANSACTIONS ON COMPUTERS (2013)

Article Computer Science, Theory & Methods

Practical byzantine fault tolerance and proactive recovery

M Castro et al.

ACM TRANSACTIONS ON COMPUTER SYSTEMS (2002)