Results 11 to 20 of about 584,673 (292)
IntegrityChain: Provable Data Possession for Decentralized Storage
Outsourced storage enables data owners to host their data on remote storage resources without keeping a local copy so as to target their core business. However, a serious problem is data integrity in the sense that data owners lose their physical control over the remote-stored data.
Yannan Li +4 more
openaire +5 more sources
Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage
Cloud computing is a burgeoning paradigm that offers reliable and adaptive infrastructure to the data owner who shares his data with the data user through the cloud server.
Yang Ming, Wenchang Shi
doaj +3 more sources
Robust Dynamic Provable Data Possession [PDF]
Remote Data Checking (RDC) allows clients to efficiently check the integrity of data stored at untrusted servers. This allows data owners to assess the risk of outsourcing data in the cloud, making RDC a valuable tool for data auditing. A robust RDC scheme incorporates mechanisms to mitigate arbitrary amounts of data corruption.
Bo Chen, Reza Curtmola
openaire +1 more source
MR-PDP: Multiple-Replica Provable Data Possession [PDF]
Many storage systems rely on replication to increase the availability and durability of data on untrusted storage systems. At present, such storage systems provide no strong evidence that multiple copies of the data are actually stored. Storage servers can collude to make it look like they are storing many copies of the data, whereas in reality they ...
Reza Curtmola +3 more
openaire +2 more sources
Is extracting data the same as possessing data? [PDF]
Abstract. Proof-of-retrievability schemes have been a topic of considerable recent interest. In these schemes, a client 𝖢 $\mathsf {C}$ gives a file M to a server
Stinson Douglas R., Upadhyay Jalaj
openaire +2 more sources
Impact of Online Service Convenience on Adoption of Electronic Information Resources [PDF]
The present study elaborated on the impact of online service convenience on the adoption intention and adoption of electronic information resources. Factors of service convenience have been identified as access convenience, search convenience, evaluation
Sachin Kumar +3 more
doaj +1 more source
Provable Data Possession Using Sigma-protocols [PDF]
We introduce a scheme for Provable Data Possession (PDP) that allows a client which has stored data at an untrusted server to verify that the server possesses the original data that it stored without retrieving it. This work is the first attempt to build a PDP scheme using the concept of sigma protocols.
Akshaya Mohan, Rajendra Katti
openaire +1 more source
Stern–Brocot-Based Non-Repudiation Dynamic Provable Data Possession
With the widespread popularity of cloud storage, cloud storage security issues have also received much attention. A provable data possession (PDP) scheme can effectively help users to verify the integrity of data stored remotely in the cloud.
Junfeng Tian, Guo Ruifang, Xuan Jing
doaj +1 more source
Audit Method of Cloud Storage Data Possession Supporting Concurrent Update [PDF]
Audit of data possession is the key technique of ensuring the cloud data integrity,but the concurrent update operation makes the audit system efficiency dramatically decreased.Aiming at this problem,this paper proposes an audit method of cloud storage ...
WANG Huifeng,LI Zhanhuai,ZHANG Xiao,SUN Jian,ZHAO Xiaonan
doaj +1 more source
Possession Disorder in Makassar Indonesia
This study discusses the occurrence of possession disorders in Makassar. The method used is a qualitative grounded theory method with data collection using semi-structured interviews and focus group discussions. The participants were three women, each of
Siswanto Siswanto +3 more
doaj +1 more source

