4.8 Article

Backdoor-Resistant Public Data Integrity Verification Scheme Based on Smart Contracts

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Blockchain-Based Transparent Integrity Auditing and Encrypted Deduplication for Cloud Storage

Shanshan Li et al.

Summary: In this paper, a concept of transparent integrity auditing is introduced and a concrete scheme based on the blockchain is proposed. It goes beyond existing public auditing schemes by eliminating the need for third-party auditors and reducing communication costs for users. Additionally, a secure transparent deduplication scheme based on the blockchain is constructed, which allows users to attest the deduplication pattern on the cloud server. The integration of the proposed auditing and deduplication schemes into one system, BLIND, is also presented, demonstrating strong security guarantees and high efficiency.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

Article Computer Science, Information Systems

Efficient Data Retrieval Over Encrypted Attribute-Value Type Databases in Cloud-Assisted Ehealth Systems

Shanshan Li et al.

Summary: This article discusses the attribute-value type formats of outsourced electronic health records in cloud-assisted eHealth systems, and introduces a triple dictionary index structure for retrieving encrypted EHRs based on identity and attribute value. The use of an identity server to generate encryption keys in an oblivious way ensures secure retrieval without leaking information, achieving $L$-adaptive security and forward security with high efficiency.

IEEE SYSTEMS JOURNAL (2022)

Article Automation & Control Systems

A Secure Network Model Against Bot Attacks in Edge-Enabled Industrial Internet of Things

Vasileios A. Memos et al.

Summary: The new Industry 4.0 standard improves production efficiency for industries by leveraging cutting-edge technologies. However, it also poses security and privacy risks. This article proposes a secure network model to enhance security and privacy in industrial IoTs, and experimental results demonstrate promising performance against bot attacks.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Information Systems

Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage

Anjia Yang et al.

Summary: Cloud storage is widely used nowadays, alleviating the burden of local data storage. Ensuring the security and integrity of outsourced data in the cloud has attracted significant attention. Proofs of storage (POS) address this issue, with publicly verifiable POS improving scalability by allowing third-party verification. The proposed Delegatable Proofs of Storage (DPOS) scheme provides efficient tag generation, supporting dynamic operations with high efficiency while maintaining soundness and privacy protection.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)

Article Computer Science, Software Engineering

Smart Contract Development: Challenges and Opportunities

Weiqin Zou et al.

Summary: Smart contracts have gained increasing attention, but their development faces several challenges including security, limited development tools, programming language and virtual machine limitations, performance issues, and lack of online resources. Researchers and practitioners can explore various directions to help improve the experience of developing high-quality smart contracts.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2021)

Article Computer Science, Information Systems

CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors

Xiaojun Zhang et al.

Summary: The proposed conditional identity privacy-preserving public auditing (CIPPPA) mechanism aims to address the issue of traditional public auditing mechanisms failing to achieve conditional identity privacy for patients in cloud-based WBANs. By integrating Ethereum blockchain to assist patients in validating malicious auditing behaviors, reliable medical data management and security are achieved.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)

Article Computer Science, Information Systems

Key-Leakage Resilient Encrypted Data Aggregation With Lightweight Verification in Fog-Assisted Smart Grids

Xiaojun Zhang et al.

Summary: This article analyzes the characteristics of smart grids, highlighting the sensitivity of electricity consumption data and the importance of encryption. A key-leakage resilient encrypted data aggregation scheme is proposed for smart grids to protect user privacy and ensure data integrity.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

IoT-Based Big Data Secure Management in the Fog Over a 6G Wireless Network

Christos L. Stergiou et al.

Summary: This work proposes an innovative secure infrastructure operating in a wireless-mobile 6G network for managing big data in smart buildings. By combining IoT, cloud computing, edge computing, and BD functions, the aim is to achieve a smart and secure environment. The research focuses on establishing a novel cache decision system to offer users a safer and more efficient network environment.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors

Yuan Zhang et al.

Summary: The deployment of cloud storage services brings significant benefits in data management for users, but also raises security issues, such as data integrity. Public verification techniques can help users employ third-party auditors to verify data integrity, but existing schemes are vulnerable to procrastinating auditors. CPVPA is a certificateless public verification scheme using blockchain technology to address this issue, requiring auditors to record verification results in transactions on the blockchain.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)

Article Computer Science, Theory & Methods

Dredas: Decentralized, reliable and efficient remote outsourced data auditing scheme with blockchain smart contract for industrial IoT

Kuan Fan et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Theory & Methods

An overview on smart contracts: Challenges, advances and platforms

Zibin Zheng et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Information Systems

Blockchain-based public auditing and secure deduplication with fair arbitration

Haoran Yuan et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Theory & Methods

CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing

Ming Li et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2019)

Article Computer Science, Information Systems

CSED: Client-Side encrypted deduplication scheme based on proofs of ownership for cloud storage

Shanshan Li et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2019)

Article Engineering, Electrical & Electronic

Toward Blockchain-Based Fair and Anonymous Ad Dissemination in Vehicular Networks

Ming Li et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Computer Science, Information Systems

Efficient and Privacy-Preserving Carpooling Using Blockchain-Assisted Vehicular Fog Computing

Meng Li et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Theory & Methods

Bitcoin-based fair payments for outsourcing computations of fog devices

Hui Huang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Automation & Control Systems

HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems

Yuan Zhang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Information Systems

Blockchain based efficient and robust fair payment for outsourcing services in cloud computing

Yinghui Zhang et al.

INFORMATION SCIENCES (2018)

Article Computer Science, Theory & Methods

Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation

Yuan Zhang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

Server-Aided Public Key Encryption With Keyword Search

Rongmao Chen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Proceedings Paper Computer Science, Information Systems

Cryptographic Reverse Firewalls

Ilya Mironov et al.

ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II (2015)

Article Computer Science, Cybernetics

SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors

Yuan Zhang et al.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2015)

Proceedings Paper Computer Science, Theory & Methods

Outsourced Proofs of Retrievability

Frederik Armknecht et al.

CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2014)

Article Computer Science, Hardware & Architecture

Privacy-Preserving Public Auditing for Secure Cloud Storage

Cong Wang et al.

IEEE TRANSACTIONS ON COMPUTERS (2013)

Proceedings Paper Computer Science, Information Systems

Message-Locked Encryption and Secure Deduplication

Mihir Bellare et al.

ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013 (2013)