Intrusion-resilient public auditing protocol for data storage in cloud computing
From MaRDI portal
Recommendations
- Enabling cloud storage auditing with key-exposure resilience under continual key-leakage
- ID-based public auditing protocol for cloud storage data integrity checking with strengthened authentication and security
- Public cloud data auditing with practical key update and zero knowledge privacy
- Improved secure fuzzy auditing protocol for cloud data storage
- Attribute-based data integrity checking for cloud storage
Cited in
(11)- Enabling cloud storage auditing with key-exposure resilience under continual key-leakage
- An Improved Secure Cloud Storage Auditing Protocol Based on Distributed String Equality Checking
- Public audit for operation behavior logs with error locating in cloud storage
- Security of auditing protocols against subversion attacks
- A secure and effective anonymous integrity checking protocol for data storage in multicloud
- Verifiable Auditing for Outsourced Database in Cloud Computing
- Blockchain-based efficient public integrity auditing for cloud storage against malicious auditors
- ID-based public auditing protocol for cloud storage data integrity checking with strengthened authentication and security
- Public cloud data auditing with practical key update and zero knowledge privacy
- Identity-based key-exposure resilient cloud storage public auditing scheme from lattices
- Improved secure fuzzy auditing protocol for cloud data storage
This page was built for publication: Intrusion-resilient public auditing protocol for data storage in cloud computing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1784470)