4.7 Article

Data Integrity Auditing without Private Key Storage for Secure Cloud Storage

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users

Anmin Fu et al.

Summary: This paper proposes a new privacy-aware public auditing mechanism for shared cloud data by constructing a homomorphic verifiable group signature. It ensures the integrity and security of the data.

IEEE TRANSACTIONS ON BIG DATA (2022)

Article Computer Science, Hardware & Architecture

Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data

Yue Zhang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Theory & Methods

Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage

Wenting Shen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Information Systems

Dynamic and Public Auditing with Fair Arbitration for Cloud Data

Hao Jin et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2018)

Article Computer Science, Theory & Methods

Remote data possession checking with privacy-preserving authenticators for cloud storage

Wenting Shen et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Computer Science, Theory & Methods

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage

Yong Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds

Yujue Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

Strong Key-Exposure Resilient Auditing for Secure Cloud Storage

Jia Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Hardware & Architecture

Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium

Wenting Shen et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Hardware & Architecture

RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing

Neenu Garg et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Theory & Methods

Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud

Jiangtao Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Theory & Methods

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

Jia Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Theory & Methods

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

Huaqun Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Software Engineering

Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability

Guangyang Yang et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2016)

Article Computer Science, Theory & Methods

Enabling Cloud Storage Auditing With Key-Exposure Resistance

Jia Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

Provable Multicopy Dynamic Data Possession in Cloud Computing Systems

Ayad F. Barsoum et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Boyang Wang et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2015)

Article Computer Science, Information Systems

OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices

Jin Li et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2015)

Proceedings Paper Computer Science, Information Systems

Symmetric-Key Based Proofs of Retrievability Supporting Public Verification

Chaowen Guan et al.

COMPUTER SECURITY - ESORICS 2015, PT I (2015)

Article Computer Science, Hardware & Architecture

Secure and efficient privacy-preserving public auditing scheme for cloud storage

Solomon Guadie Worku et al.

COMPUTERS & ELECTRICAL ENGINEERING (2014)

Article Computer Science, Information Systems

Identity-based remote data possession checking in public clouds

Huaqun Wang et al.

IET INFORMATION SECURITY (2014)

Article Computer Science, Theory & Methods

Compact Proofs of Retrievability

Hovav Shacham et al.

JOURNAL OF CRYPTOLOGY (2013)

Article Computer Science, Software Engineering

Security Challenges for the Public Cloud

Kui Ren et al.

IEEE INTERNET COMPUTING (2012)

Article Computer Science, Hardware & Architecture

Fuzzy identity based signature with applications to biometric authentication

Piyi Yang et al.

COMPUTERS & ELECTRICAL ENGINEERING (2011)

Article Computer Science, Theory & Methods

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Yevgeniy Dodis et al.

SIAM JOURNAL ON COMPUTING (2008)

Article Computer Science, Theory & Methods

Short signatures from the Weil pairing

D Boneh et al.

JOURNAL OF CRYPTOLOGY (2004)

Article Engineering, Electrical & Electronic

An introduction to biometric recognition

AK Jain et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2004)