4.6 Article

Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities

Lei Zhang et al.

Summary: This paper provides a critique of cryptographic schemes designed for securing sensitive data in the cloud computing environment, as well as outlining research opportunities in the use of cryptographic techniques in cloud computing.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Information Systems

Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage

Jiguo Li et al.

Summary: To increase the availability and durability of outsourced data, many customers store multiple copies on multiple cloud servers. Existing PDP protocols mainly focus on single-copy storage and rely on PKI technique, which has security vulnerabilities and high communication/computational costs. In this paper, we propose a novel identity-based PDP scheme for multi-copy on multiple cloud storage servers, achieving both security and efficiency.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)

Article Computer Science, Information Systems

Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage

Jiguo Li et al.

Summary: Cloud storage service offers an efficient way for data sharing within a group, but ensuring data integrity requires RDPC protocols. Traditional PKI-based RDPC protocols have security flaws and certificate management burden, leading to the adoption of IBC for its basis, despite the key escrow issue. To address these challenges, a new RDPC protocol is proposed using certificateless signature technique to eliminate the need for certificates and key escrow problems.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)

Article Computer Science, Hardware & Architecture

Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks

Huaxin Li et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Information Systems

Full Verifiability for Outsourced Decryption in Attribute Based Encryption

Jiguo Li et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)

Article Computer Science, Information Systems

Privacy-Preserving and Pairing-Free Multirecipient Certificateless Encryption With Keyword Search for Cloud-Assisted IIoT

Lu Yang et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Remote Data Checking With a Designated Verifier in Cloud Storage

Hao Yan et al.

IEEE SYSTEMS JOURNAL (2020)

Article Computer Science, Information Systems

Hierarchical attribute based encryption with continuous leakage-resilience

Jiguo Li et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Artificial Intelligence

DeepDirect: Learning Directions of Social Ties with Edge-Based Network Embedding

Chaokun Wang et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2019)

Article Computer Science, Information Systems

Key-policy attribute-based encryption against continual auxiliary input leakage

Jiguo Li et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Theory & Methods

CCA-secure ABE with outsourced decryption for fog computing

Cong Zuo et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage

Jiguo Li et al.

IEEE SYSTEMS JOURNAL (2018)

Article Computer Science, Hardware & Architecture

Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense

Huaxin Li et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)

Article Computer Science, Theory & Methods

Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage

Cong Zuo et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Theory & Methods

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage

Yong Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation

Yuan Zhang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage

Hao Yan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage

Debiao He et al.

INFORMATION SCIENCES (2017)

Article Computer Science, Information Systems

Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing

Jiguo Li et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)

Article Computer Science, Information Systems

KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage

Jiguo Li et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)

Article Computer Science, Theory & Methods

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

Huaqun Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Information Systems

Efficient ID-based public auditing for the outsourced data in cloud storage

Jianhong Zhang et al.

INFORMATION SCIENCES (2016)

Article Computer Science, Theory & Methods

White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes

Jianting Ning et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

Enabling Cloud Storage Auditing With Key-Exposure Resistance

Jia Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Security in cloud computing: Opportunities and challenges

Mazhar Ali et al.

INFORMATION SCIENCES (2015)

Article Computer Science, Information Systems

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Boyang Wang et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)

Article Computer Science, Information Systems

Identity-Based Distributed Provable Data Possession in Multicloud Storage

Huaqun Wang

IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)

Article Computer Science, Information Systems

Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation

Huiling Qian et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2015)

Proceedings Paper Computer Science, Information Systems

A New Public Remote Integrity Checking Scheme with User Privacy

Yiteng Feng et al.

INFORMATION SECURITY AND PRIVACY (ACISP 2015) (2015)

Article Computer Science, Theory & Methods

On the security of auditing mechanisms for secure cloud storage

Yong Yu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2014)

Article Computer Science, Information Systems

Identity-based remote data possession checking in public clouds

Huaqun Wang et al.

IET INFORMATION SECURITY (2014)

Article Computer Science, Information Systems

Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

Boyang Wang et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2014)

Article Computer Science, Hardware & Architecture

Privacy-Preserving Public Auditing for Secure Cloud Storage

Cong Wang et al.

IEEE TRANSACTIONS ON COMPUTERS (2013)

Article Computer Science, Theory & Methods

An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing

Kan Yang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Theory & Methods

Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage

Yan Zhu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)

Article Computer Science, Artificial Intelligence

A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability

Zhuo Hao et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2011)

Article Computer Science, Theory & Methods

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing

Qian Wang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2011)

Article Computer Science, Theory & Methods

Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility

Rajkumar Buyya et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2009)

Article Computer Science, Artificial Intelligence

Efficient remote data possession checking in critical information infrastructures

Francesc Sebe et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2008)

Article Computer Science, Theory & Methods

Short signatures from the Weil pairing

D Boneh et al.

JOURNAL OF CRYPTOLOGY (2004)