An alternative approach to public cloud data auditing supporting data dynamics
DOI10.1007/S00500-018-3155-4zbMATH Open1418.68078OpenAlexW2801401056WikidataQ115149006 ScholiaQ115149006MaRDI QIDQ2318271FDOQ2318271
Authors: Tao Wang, Bo Yang, Hongyu Liu, Yong Yu, G. Y. Qiu, Zhe Xia
Publication date: 14 August 2019
Published in: Soft Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00500-018-3155-4
Recommendations
- Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy
- Public cloud data auditing with practical key update and zero knowledge privacy
- Cloud data auditing with designated verifier
- Symmetric-key based proofs of retrievability supporting public verification
- Efficient dynamic provable data possession with public verifiability and data privacy
Information storage and retrieval of data (68P20) Internet topics (68M11) Authentication, digital signatures and secret sharing (94A62) Network protocols (68M12)
Cites Work
- New directions in cryptography
- Title not available (Why is that?)
- Efficient Identity-Based Encryption Without Random Oracles
- Improved security for linearly homomorphic signatures: a generic framework
- Computing on authenticated data: new privacy definitions and constructions
- Compact Proofs of Retrievability
- Proofs of Retrievability via Hardness Amplification
- Proofs of storage from homomorphic identification protocols
- Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
- Computing on Authenticated Data
- Privacy-Preserving Public Auditing for Secure Cloud Storage
- A position-aware Merkle tree for dynamic cloud data integrity verification
- Provably Secure Identity Based Provable Data Possession
- Multi-prover proof of retrievability
- Compact proofs of retrievability
- Public cloud data auditing with practical key update and zero knowledge privacy
- MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud
- Authenticated data structures, generically
Cited In (2)
Uses Software
This page was built for publication: An alternative approach to public cloud data auditing supporting data dynamics
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2318271)