Results 11 to 20 of about 584,673 (292)

IntegrityChain: Provable Data Possession for Decentralized Storage

open access: yesIEEE Journal on Selected Areas in Communications, 2020
Outsourced storage enables data owners to host their data on remote storage resources without keeping a local copy so as to target their core business. However, a serious problem is data integrity in the sense that data owners lose their physical control over the remote-stored data.
Yannan Li   +4 more
openaire   +5 more sources

Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage

open access: yesIEEE Access, 2019
Cloud computing is a burgeoning paradigm that offers reliable and adaptive infrastructure to the data owner who shares his data with the data user through the cloud server.
Yang Ming, Wenchang Shi
doaj   +3 more sources

Robust Dynamic Provable Data Possession [PDF]

open access: yes2012 32nd International Conference on Distributed Computing Systems Workshops, 2012
Remote Data Checking (RDC) allows clients to efficiently check the integrity of data stored at untrusted servers. This allows data owners to assess the risk of outsourcing data in the cloud, making RDC a valuable tool for data auditing. A robust RDC scheme incorporates mechanisms to mitigate arbitrary amounts of data corruption.
Bo Chen, Reza Curtmola
openaire   +1 more source

MR-PDP: Multiple-Replica Provable Data Possession [PDF]

open access: yes2008 The 28th International Conference on Distributed Computing Systems, 2008
Many storage systems rely on replication to increase the availability and durability of data on untrusted storage systems. At present, such storage systems provide no strong evidence that multiple copies of the data are actually stored. Storage servers can collude to make it look like they are storing many copies of the data, whereas in reality they ...
Reza Curtmola   +3 more
openaire   +2 more sources

Is extracting data the same as possessing data? [PDF]

open access: yesJournal of Mathematical Cryptology, 2014
Abstract. Proof-of-retrievability schemes have been a topic of considerable recent interest. In these schemes, a client 𝖢 $\mathsf {C}$ gives a file M to a server
Stinson Douglas R., Upadhyay Jalaj
openaire   +2 more sources

Impact of Online Service Convenience on Adoption of Electronic Information Resources [PDF]

open access: yesInternational Journal of Information Science and Management, 2023
The present study elaborated on the impact of online service convenience on the adoption intention and adoption of electronic information resources. Factors of service convenience have been identified as access convenience, search convenience, evaluation
Sachin Kumar   +3 more
doaj   +1 more source

Provable Data Possession Using Sigma-protocols [PDF]

open access: yes2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012
We introduce a scheme for Provable Data Possession (PDP) that allows a client which has stored data at an untrusted server to verify that the server possesses the original data that it stored without retrieving it. This work is the first attempt to build a PDP scheme using the concept of sigma protocols.
Akshaya Mohan, Rajendra Katti
openaire   +1 more source

Stern–Brocot-Based Non-Repudiation Dynamic Provable Data Possession

open access: yesIEEE Access, 2019
With the widespread popularity of cloud storage, cloud storage security issues have also received much attention. A provable data possession (PDP) scheme can effectively help users to verify the integrity of data stored remotely in the cloud.
Junfeng Tian, Guo Ruifang, Xuan Jing
doaj   +1 more source

Audit Method of Cloud Storage Data Possession Supporting Concurrent Update [PDF]

open access: yesJisuanji gongcheng, 2016
Audit of data possession is the key technique of ensuring the cloud data integrity,but the concurrent update operation makes the audit system efficiency dramatically decreased.Aiming at this problem,this paper proposes an audit method of cloud storage ...
WANG Huifeng,LI Zhanhuai,ZHANG Xiao,SUN Jian,ZHAO Xiaonan
doaj   +1 more source

Possession Disorder in Makassar Indonesia

open access: yesJurnal Psikologi Undip, 2021
This study discusses the occurrence of possession disorders in Makassar. The method used is a qualitative grounded theory method with data collection using semi-structured interviews and focus group discussions. The participants were three women, each of
Siswanto Siswanto   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy