4.5 Article

DIVRS: Data integrity verification based on ring signature in cloud storage

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Enabling Fast Public Auditing and Data Dynamics in Cloud Services

Changhee Hahn et al.

Summary: This article revisits public auditing for encrypted data and proposes a novel scheme that efficiently supports data dynamics and improves the verification speed for auditing results.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Information Systems

Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage

Jiguo Li et al.

Summary: To increase the availability and durability of outsourced data, many customers store multiple copies on multiple cloud servers. Existing PDP protocols mainly focus on single-copy storage and rely on PKI technique, which has security vulnerabilities and high communication/computational costs. In this paper, we propose a novel identity-based PDP scheme for multi-copy on multiple cloud storage servers, achieving both security and efficiency.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)

Article Computer Science, Information Systems

SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage

Sanjeet Kumar Nayak et al.

Summary: Cloud computing is a paradigm that reduces storage and maintenance costs for data owners, while also posing security risks due to the loss of physical control over data. To address issues of data integrity and privacy, a secure and efficient SEPDP scheme is proposed, extending to support multiple owners, data dynamics, and batch verification with low computational overhead.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)

Article Computer Science, Information Systems

Outsourcing Proofs of Retrievability

Frederik Armknecht et al.

Summary: Proofs of Retrievability (POR) are cryptographic proofs used to ensure that users can retrieve their files stored in the cloud at all times. The need for network access and computational resources hinders the wide adoption of POR by cloud users. Outsourced Proofs of Retrievability (OPOR) can reduce user effort and incur minimal overhead on auditors, making them a more efficient option for secure cloud file retrieval.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)

Article Computer Science, Information Systems

Data tag replacement algorithm for data integr ity ver ification in cloud storage

Guangwei Xu et al.

Summary: This paper proposes a secure and reliable data tag replacement algorithm DTRA, which updates the data owner's private key and implements data tag replacement directly in the remote storage environment using homomorphic encryption, reducing data transmission overhead.

COMPUTERS & SECURITY (2021)

Article Computer Science, Information Systems

Comments on SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage

Jia Yu et al.

Summary: The newly proposed provable data possession scheme failed to achieve data storage integrity, thus posing a potential security risk.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)

Article Computer Science, Information Systems

Certificateless multi-replica public integrity auditing scheme for dynamic shared data in cloud storage

Jaya Rao Gudeme et al.

Summary: This paper presents a Certificateless Multi-Replica Dynamic Public Auditing Scheme for Shared data in cloud storage, addressing integrity and security concerns, supporting shared data dynamics, and enabling secure user revocation. The scheme is proven to be secure against different types of adversaries under certain assumptions and has been shown to be efficient and practical through performance and experimental evaluations.

COMPUTERS & SECURITY (2021)

Article Computer Science, Information Systems

Data integrity auditing for secure cloud storage using user behavior prediction

Junfeng Tian et al.

Summary: This paper focuses on the core security issue of data integrity in cloud storage, addressing the resource waste caused by invalid auditing through the introduction of user behavior prediction algorithms and proposing the concept of valid auditing. By formalizing a system model and security model, as well as developing a prototype implementation, it improves auditing efficiency and reduces invalid auditing.

COMPUTERS & SECURITY (2021)

Article Computer Science, Hardware & Architecture

Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems

Yannan Li et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Theory & Methods

Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage

Wenting Shen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Information Systems

Dynamic Proofs of Retrievability for Coded Cloud Storage Systems

Zhengwei Ren et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2018)

Article Computer Science, Information Systems

Dynamic and Public Auditing with Fair Arbitration for Cloud Data

Hao Jin et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2018)

Article Computer Science, Theory & Methods

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage

Yong Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data

Jian Shen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud

Jiangtao Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Theory & Methods

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

Jia Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Information Systems

Dynamic Provable Data Possession

C. Chris Erway et al.

ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2015)

Article Computer Science, Theory & Methods

Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage

Jian Liu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

Provable Multicopy Dynamic Data Possession in Cloud Computing Systems

Ayad F. Barsoum et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Boyang Wang et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)

Article Computer Science, Theory & Methods

An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing

Kan Yang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Information Systems

Dynamic Audit Services for Outsourced Storages in Clouds

Yan Zhu et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2013)

Article Computer Science, Theory & Methods

Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage

Yan Zhu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)

Article Computer Science, Theory & Methods

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing

Qian Wang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2011)