4.7 Article

Efficient Continuous Big Data Integrity Checking for Decentralized Storage

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

Blockchain-Based Private Provable Data Possession

Huaqun Wang et al.

Summary: A new blockchain-based private PDP model is proposed in the study, which designs a provably secure PDP scheme using blockchain technology and RSA algorithm. The performance of the proposed PDP scheme is analyzed theoretically and through practical implementation, showing that it is secure, efficient, and practical.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Engineering, Multidisciplinary

On the Blockchain-Based Decentralized Data Sharing for Event Based Encryption to Combat Adversarial Attacks

Ronald Doku et al.

Summary: This research introduces Event-Based Encryption (EBE) as an encryption mechanism that decrypts messages in the future to avoid adversarial attacks. By utilizing multi-authority ABE schemes, NLP techniques, and a decentralized data-sharing platform, multiple parties collaborate to confirm events and trigger message decryption. The practical and secure nature of EBE is highlighted through numerical results.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2021)

Article Computer Science, Information Systems

Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree

Lu Rao et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)

Article Computer Science, Software Engineering

New public auditing protocol based on homomorphic tags for secure cloud storage

Jindan Zhang et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2020)

Article Computer Science, Information Systems

A Public Auditing Protocol for Cloud Storage System With Intrusion-Resilience

Ran Ding et al.

IEEE SYSTEMS JOURNAL (2020)

Article Automation & Control Systems

Energy-Efficient and Trustworthy Data Collection Protocol Based on Mobile Fog Computing in Internet of Things

Tian Wang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Automation & Control Systems

Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System

Arun Kumar Sangaiah et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

Blockchain-based fair payment smart contract for public cloud storage auditing

Hao Wang et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

Blockchain-Based Dynamic Provable Data Possession for Smart Cities

Ruonan Chen et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Blockchain-Enabled Distributed Security Framework for Next-Generation IoT: An Edge Cloud and Software-Defined Network-Integrated Approach

Darshan Vishwasrao Medhane et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Proceedings Paper Computer Science, Information Systems

Proof of Storage-Time: Efficiently Checking Continuous Data Availability

Giuseppe Ateniese et al.

27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020) (2020)

Article Computer Science, Information Systems

Blockchain Empowered Arbitrable Data Auditing Scheme for Network Storage as a Service

Yang Xu et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)

Article Engineering, Multidisciplinary

Stochastic Blockchain for IoT Data Integrity

Yu-Jia Chen et al.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2020)

Article Computer Science, Hardware & Architecture

Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing

Jian Shen et al.

IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2020)

Article Computer Science, Theory & Methods

Outsourced dynamic provable data possession with batch update for secure cloud storage

Wei Guo et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Automation & Control Systems

Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics

Arun Kumar Sangaiah et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Computer Science, Software Engineering

ID-based dynamic replicated data auditing for the cloud

Haiyang Yu et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2019)

Proceedings Paper Computer Science, Information Systems

Poster: Proofs of Retrievability with Low Server Storage

Michael Hanling et al.

PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)

Proceedings Paper Computer Science, Information Systems

Efficient Verifiable Delay Functions

Benjamin Wesolowski

ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT III (2019)

Article Computer Science, Hardware & Architecture

Recent security challenges in cloud computing

Nalini Subramanian et al.

COMPUTERS & ELECTRICAL ENGINEERING (2018)

Article Telecommunications

Privacy-Preserving Public Auditing for Non-manager Group Shared Data

Longxia Huang et al.

WIRELESS PERSONAL COMMUNICATIONS (2018)

Article Computer Science, Artificial Intelligence

PCCA: Position Confidentiality Conserving Algorithm for Content-Protection in e-Governance Services and Applications

Darshan Vishwasrao Medhane et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE (2018)

Proceedings Paper Computer Science, Information Systems

Public Auditing for Network Coding Based Secure Cloud Storage

Xiang Liu et al.

2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) (2018)

Article Computer Science, Software Engineering

Integrity as a service for replicated data on the cloud

Alshaimaa Abo-alian et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2017)

Article Computer Science, Theory & Methods

An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data

Jian Shen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

Efficient integrity verification of replicated data in cloud computing system

Mingxu Yi et al.

COMPUTERS & SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

A Novel approach to Secure Cloud Data Storage and Dynamic Data Auditing in a Cloud

K. Brindha et al.

PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017) (2017)

Article Computer Science, Software Engineering

Provable multiple replication data possession with full dynamics for secure cloud storage

Yafang Zhang et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2016)

Article Computer Science, Information Systems

Dynamic Provable Data Possession

C. Chris Erway et al.

ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2015)

Article Computer Science, Theory & Methods

Provable Multicopy Dynamic Data Possession in Cloud Computing Systems

Ayad F. Barsoum et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Proceedings Paper Computer Science, Information Systems

Proofs of Space

Stefan Dziembowski et al.

ADVANCES IN CRYPTOLOGY, PT II (2015)

Article Information Science & Library Science

Beyond the hype: Big data concepts, methods, and analytics

Amir Gandomi et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2015)

Proceedings Paper Computer Science, Hardware & Architecture

A Survey of Load Balancing in Cloud Computing: Challenges and Algorithms

Klaithem Al Nuaimi et al.

2012 IEEE SECOND SYMPOSIUM ON NETWORK CLOUD COMPUTING AND APPLICATIONS (NCCA 2012) (2012)