Results 261 to 270 of about 584,673 (292)
Some of the next articles are maybe not open access.
Data dynamics for remote data possession checking in cloud storage
Computers & Electrical Engineering, 2013In cloud storage, storage servers may not be fully trustworthy. Therefore, it is of great importance for users to check whether the data is kept intact. This is the goal of remote data possession checking (RDPC) schemes. In this paper, an RDPC scheme based on homomorphic hashing is proposed.
Lanxiang Chen +3 more
openaire +1 more source
Provable Data Possession Using Identity-Based Encryption
2018Nowadays, we have many remote data storage systems available which allow clients to store their data on remote server. But these systems possess many security problems like integrity, availability, and privacy. Unauthorized modification of files must not be possible, but this problem should be resolved.
Smit Kadvani +4 more
openaire +1 more source
Provably Secure Identity Based Provable Data Possession
2015Provable Data Possession PDP, which enables cloud users to verify the integrity of their outsourced data without retrieving the entire file from cloud servers, is highly essential in secure cloud storage. A majority of the existing PDP schemes rely on the expensive Public Key Infrastructure PKI.
Yu, Yong +4 more
openaire +2 more sources
Towards comprehensive provable data possession in cloud computing
Wuhan University Journal of Natural Sciences, 2013To check the remote data integrity in cloud computing, we have proposed an efficient and full data dynamic provable data possession (PDP) scheme that uses a SN (serial number)-BN (block number) table to support data block update. In this article, we first analyze and test its performance in detail. The result shows that our scheme is efficient with low
Chaoling Li +3 more
openaire +1 more source
Enhancement of provable data possession algorithm
AIP Conference Proceedings, 2023K. Kishore Kumar +3 more
openaire +1 more source
A Provable Data Possession Scheme with Data Hierarchy in Cloud
2016In recent years, numerous provable data possession PDP schemes have been proposed for checking the availability and integrity of data stored on cloud storage server CSS which is not fully trusted. However, these schemes do not work with specific subsets of verifiers, and they do not efficiently support dynamic enrollment and revocation of verifiers. In
Changlu Lin +3 more
openaire +1 more source
Delegable Provable Data Possession for Remote Data in the Clouds
2011Many storage systems need to do authorized verification for data integrity. For example, a user stores his data into cloud storage servers and shares his data with his friends. They check data integrity periodically to ensure data intact. However, they don't want a stranger to check data integrity on their data.
Shiuan-Tzuo Shen, Wen-Guey Tzeng
openaire +1 more source
An overview of real‐world data sources for oncology and considerations for research
Ca-A Cancer Journal for Clinicians, 2022Lynne Penberthy +2 more
exaly
SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage
IEEE Transactions on Services Computing, 2021Sanjeet Kumar Nayak, Somanath Tripathy
exaly

