4.5 Article

Identity-based public data integrity verification scheme in cloud storage system via blockchain

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

Blockchain-Based Private Provable Data Possession

Huaqun Wang et al.

Summary: A new blockchain-based private PDP model is proposed in the study, which designs a provably secure PDP scheme using blockchain technology and RSA algorithm. The performance of the proposed PDP scheme is analyzed theoretically and through practical implementation, showing that it is secure, efficient, and practical.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Theory & Methods

A survey on the security of blockchain systems

Xiaoqi Li et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Information Systems

Blockchain-based cloudlet management for multimedia workflow in mobile cloud computing

Xiaolong Xu et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2020)

Article Computer Science, Theory & Methods

Blockchain data-based cloud data integrity protection mechanism

PengCheng Wei et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Information Systems

Blockchain-based fair payment smart contract for public cloud storage auditing

Hao Wang et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

Blockchain-based public auditing and secure deduplication with fair arbitration

Haoran Yuan et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems

Quanyu Zhao et al.

INFORMATION PROCESSING & MANAGEMENT (2020)

Article Computer Science, Information Systems

Decentralized and Privacy-Preserving Public Auditing for Cloud Storage Based on Blockchain

Ying Miao et al.

IEEE ACCESS (2020)

Article Computer Science, Hardware & Architecture

Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems

Yannan Li et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Theory & Methods

Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage

Wenting Shen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Information Systems

Identity-based public auditing for cloud storage systems against malicious auditors via blockchain

Jingting Xue et al.

SCIENCE CHINA-INFORMATION SCIENCES (2019)

Article Computer Science, Theory & Methods

Security and Privacy on Blockchain

Rui Zhang et al.

ACM COMPUTING SURVEYS (2019)

Article Computer Science, Theory & Methods

Outsourced dynamic provable data possession with batch update for secure cloud storage

Wei Guo et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

Blockchain based efficient and robust fair payment for outsourcing services in cloud computing

Yinghui Zhang et al.

INFORMATION SCIENCES (2018)

Article Engineering, Electrical & Electronic

When Mobile Blockchain Meets Edge Computing

Zehui Xiong et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Computer Science, Theory & Methods

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage

Yong Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

Online/Offline Provable Data Possession

Yujue Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends

Zibin Zheng et al.

2017 IEEE 6TH INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS 2017) (2017)

Proceedings Paper Computer Science, Information Systems

A Traceability Analysis of Monero's Blockchain

Amrit Kumar et al.

COMPUTER SECURITY - ESORICS 2017, PT II (2017)

Article Computer Science, Theory & Methods

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

Huaqun Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Theory & Methods

Enabling Cloud Storage Auditing With Key-Exposure Resistance

Jia Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

Provable Multicopy Dynamic Data Possession in Cloud Computing Systems

Ayad F. Barsoum et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Proceedings Paper Computer Science, Information Systems

Zerocash: Decentralized Anonymous Payments from Bitcoin

Eli Ben-Sasson et al.

2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014) (2014)

Article Computer Science, Hardware & Architecture

Privacy-Preserving Public Auditing for Secure Cloud Storage

Cong Wang et al.

IEEE TRANSACTIONS ON COMPUTERS (2013)

Article Computer Science, Theory & Methods

Compact Proofs of Retrievability

Hovav Shacham et al.

JOURNAL OF CRYPTOLOGY (2013)

Article Computer Science, Information Systems

Proxy Provable Data Possession in Public Clouds

Huaqun Wang

IEEE TRANSACTIONS ON SERVICES COMPUTING (2013)

Article Computer Science, Information Systems

Remote Data Checking Using Provable Data Possession

Giuseppe Ateniese et al.

ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2011)

Article Computer Science, Artificial Intelligence

A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability

Zhuo Hao et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2011)

Article Computer Science, Theory & Methods

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing

Qian Wang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2011)

Article Telecommunications

An identity-based signature scheme from the Weil pairing

X Yi

IEEE COMMUNICATIONS LETTERS (2003)

Article Engineering, Electrical & Electronic

ID-based signatures from pairings on elliptic curves

KG Paterson

ELECTRONICS LETTERS (2002)