4.3 Article

A Blockchain-Based Flexible Data Auditing Scheme for the Cloud Service

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Blockchain-Enabled Secure Data Sharing Scheme in Mobile-Edge Computing: An Asynchronous Advantage Actor-Critic Learning Approach

Lei Liu et al.

Summary: Mobile-edge computing (MEC) plays a crucial role in supporting various service applications through efficient data sharing. However, the unique characteristics of MEC also introduce data privacy and security concerns, hindering its development. Blockchain technology is seen as a promising solution to ensure secure data sharing, but integrating it into MEC systems faces challenges due to dynamic network conditions. In this article, a secure data sharing scheme using an asynchronous learning approach in a blockchain-enabled MEC system is proposed, aiming to optimize system performance while balancing energy consumption and throughput.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Blockchain-based public auditing for big data in cloud storage

Jiaxing Li et al.

INFORMATION PROCESSING & MANAGEMENT (2020)

Article Automation & Control Systems

Securing parked vehicle assisted fog computing with blockchain and optimal smart contract design

Xumin Huang et al.

IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2020)

Article Computer Science, Theory & Methods

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage

Yong Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Proceedings Paper Computer Science, Hardware & Architecture

ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability

Xueping Liang et al.

2017 17TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID) (2017)

Article Computer Science, Information Systems

IPad: ID-based public auditing for the outsourced data in the standard model

Jianhong Zhang et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2016)

Article Computer Science, Software Engineering

Provable multiple replication data possession with full dynamics for secure cloud storage

Yafang Zhang et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2016)

Article Computer Science, Theory & Methods

Cloud data integrity checking with an identity-based auditing mechanism from RSA

Yong Yu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)

Article Computer Science, Theory & Methods

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

Huaqun Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Information Systems

Efficient ID-based public auditing for the outsourced data in cloud storage

Jianhong Zhang et al.

INFORMATION SCIENCES (2016)

Article Computer Science, Hardware & Architecture

Efficient Dynamic Provable Possession of Remote Data via Update Trees

Yihua Zhang et al.

ACM TRANSACTIONS ON STORAGE (2016)

Article Computer Science, Information Systems

Dynamic Provable Data Possession

C. Chris Erway et al.

ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2015)

Article Computer Science, Hardware & Architecture

MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud

Chang Liu et al.

IEEE TRANSACTIONS ON COMPUTERS (2015)

Article Computer Science, Hardware & Architecture

Verifiable Auditing for Outsourced Database in Cloud Computing

Jianfeng Wang et al.

IEEE TRANSACTIONS ON COMPUTERS (2015)

Article Computer Science, Theory & Methods

Provable Multicopy Dynamic Data Possession in Cloud Computing Systems

Ayad F. Barsoum et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Hardware & Architecture

An Effective Integrity Check Scheme for Secure Erasure Code-Based Storage Systems

Shiuan-Tzuo Shen et al.

IEEE TRANSACTIONS ON RELIABILITY (2015)

Article Computer Science, Information Systems

Identity-Based Distributed Provable Data Possession in Multicloud Storage

Huaqun Wang

IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)

Proceedings Paper Computer Science, Information Systems

Provably Secure Identity Based Provable Data Possession

Yong Yu et al.

PROVABLE SECURITY, PROVSEC 2015 (2015)

Article Computer Science, Information Systems

Identity-based remote data possession checking in public clouds

Huaqun Wang et al.

IET INFORMATION SECURITY (2014)

Article Computer Science, Information Systems

Cloud data auditing with designated verifier

Solomon Guadie Worku et al.

FRONTIERS OF COMPUTER SCIENCE (2014)

Article Computer Science, Hardware & Architecture

Privacy-Preserving Public Auditing for Secure Cloud Storage

Cong Wang et al.

IEEE TRANSACTIONS ON COMPUTERS (2013)

Article Computer Science, Theory & Methods

An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing

Kan Yang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Hardware & Architecture

Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing

Jining Zhao et al.

IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES (2013)

Article Computer Science, Theory & Methods

Compact Proofs of Retrievability

Hovav Shacham et al.

JOURNAL OF CRYPTOLOGY (2013)

Article Computer Science, Theory & Methods

Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage

Yan Zhu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)