Nothing Special   »   [go: up one dir, main page]

Li et al., 2016 - Google Patents

Privacy-preserving public auditing protocol for low-performance end devices in cloud

Li et al., 2016

Document ID
10628279205138221981
Author
Li J
Zhang L
Liu J
Qian H
Dong Z
Publication year
Publication venue
IEEE Transactions on Information Forensics and Security

External Links

Snippet

Cloud storage provides tremendous storage resources for both individual and enterprise users. In a cloud storage system, the data owned by a user are no longer possessed locally. Hence, it is not competent to ensure the integrity of the outsourced data using traditional …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers

Similar Documents

Publication Publication Date Title
Li et al. Privacy-preserving public auditing protocol for low-performance end devices in cloud
Li et al. Blockchain-based public auditing for big data in cloud storage
Yuan et al. Blockchain-based public auditing and secure deduplication with fair arbitration
Yu et al. Strong key-exposure resilient auditing for secure cloud storage
Fu et al. NPP: A new privacy-aware public auditing scheme for cloud data sharing with group users
Yu et al. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage
Zhang et al. SCLPV: Secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors
Mahalakshmi et al. Public auditing scheme for integrity verification in distributed cloud storage system
Shang et al. Identity-based dynamic data auditing for big data storage
Ji et al. Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property
Yan et al. A dynamic integrity verification scheme of cloud storage data based on lattice and Bloom filter
Li et al. A Blockchain‐Based Public Auditing Protocol with Self‐Certified Public Keys for Cloud Data
Mishra et al. Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment
Peng et al. Secure lightweight stream data outsourcing for internet of things
Hou et al. Efficient audit protocol supporting virtual nodes in cloud storage
Qiao et al. An anonymous and efficient certificate-based identity authentication protocol for VANET
Wang et al. TrDup: Enhancing secure data deduplication with user traceability in cloud computing
Liu et al. Identity-based remote data integrity checking of cloud storage from lattices
Zhang et al. Attack on Chen et al.'s certificateless aggregate signature scheme
Tang et al. Aggregation‐Based Tag Deduplication for Cloud Storage with Resistance against Side Channel Attack
Xu et al. A generic integrity verification algorithm of version files for cloud deduplication data storage
Dong et al. A survey on data integrity checking in cloud
Zhang et al. Shared dynamic data audit supporting anonymous user revocation in cloud storage
Cao et al. An integrity verification scheme of completeness and zero‐knowledge for multi‐Cloud storage
Zhang et al. Data integrity verification scheme based on blockchain smart contract