4.5 Article

Integrity coded databases- protecting data integrity for outsourced databases

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Multi-cloud applications: data and code fragmentation for improved security

Rudolf Lovrencic et al.

Summary: This paper introduces a method to protect data privacy while enabling data processing in the cloud. It utilizes constraint-based data and code fragmentation and deploys these fragments to multiple independent computer clouds. The paper presents several architectural patterns for secure computation in a multi-cloud environment, demonstrates the use of the method, and examines the introduced performance penalty on a simple application.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2023)

Article Computer Science, Hardware & Architecture

Proofs of retrievability with tag outsourcing based on Goppa codes

Shan Ji et al.

Summary: A provable data integrity scheme based on coding mechanism is proposed in this paper, which achieves user data privacy protection by supporting data tag calculation outsourcing on the client side. The use of an FSB hash function generates a decodable syndrome, reducing the computational overhead of the tag. Provable security method is used to guarantee the security of the scheme, and the performance is evaluated to prove its effectiveness.

COMPUTER STANDARDS & INTERFACES (2023)

Article Telecommunications

An Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud

K. L. Neela et al.

Summary: This paper proposes a secure Cloud Storage environment without a third-party system and introduces an Improved RSA Encryption Algorithm (IREA) along with the Flexible Capacity Cuckoo Filter (FCCF) auditing technique without Third Party Auditing. The experimental results show that the proposed system has less time consumption in terms of data security.

WIRELESS PERSONAL COMMUNICATIONS (2022)

Article Computer Science, Information Systems

Outsourced data integrity verification based on blockchain in untrusted environment

Kun Hao et al.

WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS (2020)

Article Computer Science, Theory & Methods

Towards achieving flexible and verifiable search for outsourced database in cloud computing

Jianfeng Wang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Computer Science, Hardware & Architecture

Verifiable Auditing for Outsourced Database in Cloud Computing

Jianfeng Wang et al.

IEEE TRANSACTIONS ON COMPUTERS (2015)