Li et al., 2016 - Google Patents
Privacy-preserving public auditing protocol for low-performance end devices in cloudLi et al., 2016
- Document ID
- 10628279205138221981
- Author
- Li J
- Zhang L
- Liu J
- Qian H
- Dong Z
- Publication year
- Publication venue
- IEEE Transactions on Information Forensics and Security
External Links
Snippet
Cloud storage provides tremendous storage resources for both individual and enterprise users. In a cloud storage system, the data owned by a user are no longer possessed locally. Hence, it is not competent to ensure the integrity of the outsourced data using traditional …
- 238000000034 method 0 description 19
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Privacy-preserving public auditing protocol for low-performance end devices in cloud | |
Li et al. | Blockchain-based public auditing for big data in cloud storage | |
Yuan et al. | Blockchain-based public auditing and secure deduplication with fair arbitration | |
Yu et al. | Strong key-exposure resilient auditing for secure cloud storage | |
Fu et al. | NPP: A new privacy-aware public auditing scheme for cloud data sharing with group users | |
Yu et al. | Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage | |
Zhang et al. | SCLPV: Secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors | |
Mahalakshmi et al. | Public auditing scheme for integrity verification in distributed cloud storage system | |
Shang et al. | Identity-based dynamic data auditing for big data storage | |
Ji et al. | Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property | |
Yan et al. | A dynamic integrity verification scheme of cloud storage data based on lattice and Bloom filter | |
Li et al. | A Blockchain‐Based Public Auditing Protocol with Self‐Certified Public Keys for Cloud Data | |
Mishra et al. | Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment | |
Peng et al. | Secure lightweight stream data outsourcing for internet of things | |
Hou et al. | Efficient audit protocol supporting virtual nodes in cloud storage | |
Qiao et al. | An anonymous and efficient certificate-based identity authentication protocol for VANET | |
Wang et al. | TrDup: Enhancing secure data deduplication with user traceability in cloud computing | |
Liu et al. | Identity-based remote data integrity checking of cloud storage from lattices | |
Zhang et al. | Attack on Chen et al.'s certificateless aggregate signature scheme | |
Tang et al. | Aggregation‐Based Tag Deduplication for Cloud Storage with Resistance against Side Channel Attack | |
Xu et al. | A generic integrity verification algorithm of version files for cloud deduplication data storage | |
Dong et al. | A survey on data integrity checking in cloud | |
Zhang et al. | Shared dynamic data audit supporting anonymous user revocation in cloud storage | |
Cao et al. | An integrity verification scheme of completeness and zero‐knowledge for multi‐Cloud storage | |
Zhang et al. | Data integrity verification scheme based on blockchain smart contract |