4.6 Article

SM2-Based Offline/Online Efficient Data Integrity Verification Scheme for Multiple Application Scenarios

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT

Youliang Tian et al.

Summary: This paper presents a graph clustering privacy-preserving method based on structure entropy, which protects private information and ensures accurate mining results. Experimental evaluation shows that this method has higher efficiency and reliability.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

Identity-based remote data checking with a designated verifier

Yanyan Ji et al.

Summary: Traditional remote data possession auditing mechanisms are divided into private auditing and public auditing. However, existing protocols cannot meet the requirement of data owners who want a specific verifier to audit their data. To overcome this limitation, researchers propose an identity-based auditing protocol that avoids the complexity of certificate management and enables specific verifiers to perform the audit.

JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS (2022)

Article Computer Science, Information Systems

Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property

Yanyan Ji et al.

Summary: This paper discusses an improved approach to the provable data possession protocol, reducing communication overhead through flexible data splitting and tag aggregating techniques, and introducing identity-based signatures to make the protocol completely identity-based.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2022)

Article Automation & Control Systems

TRAC: Traceable and Revocable Access Control Scheme for mHealth in 5G-Enabled IIoT

Qi Li et al.

Summary: This article proposes an efficient, traceable, and revocable access control scheme named TRAC for mobile healthcare in 5G-enabled IIoT. It utilizes ciphertext-policy attribute-based encryption to protect the confidentiality of personal health records and can precisely track and revoke the privileges of malicious users.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Information Systems

Consortium Blockchain-Based Public Integrity Verification in Cloud Storage for IoT

Yangfei Lin et al.

Summary: The applications of IoT have had a significant impact on various aspects of people's lives, creating a large volume of data. To ensure the integrity of cloud-stored data, a consortium blockchain-based public integrity verification system is proposed, in which the behaviors of third-party auditors are recorded on the blockchain for auditing purposes.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

Redactable Signature-Based Public Auditing Scheme With Sensitive Data Sharing for Cloud Storage

Song Li et al.

Summary: To ensure the integrity of data stored in a cloud server, data owners need to use public auditing techniques. However, if data is modified dynamically during the data anonymization process, the auditing result becomes invalid. Therefore, we propose a new scheme based on redactable signatures, which allows direct transformation of signatures when sharing sensitive data, without the need for additional data sanitizers.

IEEE SYSTEMS JOURNAL (2022)

Article Computer Science, Theory & Methods

An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage

Yang Yang et al.

Summary: Cloud storage is becoming increasingly prevalent and checking its integrity is vital. This paper proposes an ID-based PDP protocol with compressed cloud storage to improve performance and reduce storage and computation costs.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2022)

Article Engineering, Electrical & Electronic

A Blockchain-Based Flexible Data Auditing Scheme for the Cloud Service

Fan Kefeng et al.

Summary: The paper introduces a blockchain-based cloud data auditing scheme, which improves the stability, security, and performance of the scheme through a decentralized auditing framework and eliminates the dependency on a third-party auditor.

CHINESE JOURNAL OF ELECTRONICS (2021)

Article Computer Science, Theory & Methods

Certificateless privacy preserving public auditing for dynamic shared data with group user revocation in cloud storage

Jaya Rao Gudeme et al.

Summary: This paper proposes a certificateless privacy preserving public auditing scheme for dynamic shared data with group user revocation in cloud storage (CLPPPA), which protects data privacy from the verifier using a random masking technique. The scheme also supports shared data dynamics and group user revocation, while ensuring security under computational Diffie-Hellman (CDH) and discrete logarithm (DL) assumptions. The performance evaluation shows that CLPPPA achieves desirable efficiency.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2021)

Article Computer Science, Hardware & Architecture

BB-tree based secure and dynamic public auditing convergence for cloud storage

Rahul Mishra et al.

Summary: Cloud computing is a service that hosts data online and charges on a pay-per-use model. While it brings many benefits, there is a lack of trust from users towards cloud service providers, leading to concerns about data privacy and integrity. Researchers have introduced a novel dynamic data structure and auditing protocol to address these issues, enabling users to easily track data changes and recover corrupted data blocks.

JOURNAL OF SUPERCOMPUTING (2021)

Article Computer Science, Information Systems

An identity-based online/offline secure cloud storage auditing scheme

Reyhaneh Rabaninejad et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2020)

Article Automation & Control Systems

A Personalized Privacy Protection Framework for Mobile Crowdsensing in IIoT

Jinbo Xiong et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

LDVAS: Lattice-Based Designated Verifier Auditing Scheme for Electronic Medical Data in Cloud-Assisted WBANs

Xiaojun Zhang et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

Outsourced dynamic provable data possession with batch update for secure cloud storage

Wei Guo et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Engineering, Electrical & Electronic

Key-leakage hardware Trojan with super concealment based on the fault injection for block cipher of SM4 Key

Di Wang et al.

ELECTRONICS LETTERS (2018)

Article Computer Science, Information Systems

Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage

Hui Tian et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)

Article Multidisciplinary Sciences

Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols

Ang Yang et al.

SCIENTIFIC WORLD JOURNAL (2014)