Results 261 to 270 of about 584,673 (292)
Some of the next articles are maybe not open access.

Data dynamics for remote data possession checking in cloud storage

Computers & Electrical Engineering, 2013
In cloud storage, storage servers may not be fully trustworthy. Therefore, it is of great importance for users to check whether the data is kept intact. This is the goal of remote data possession checking (RDPC) schemes. In this paper, an RDPC scheme based on homomorphic hashing is proposed.
Lanxiang Chen   +3 more
openaire   +1 more source

Provable Data Possession Using Identity-Based Encryption

2018
Nowadays, we have many remote data storage systems available which allow clients to store their data on remote server. But these systems possess many security problems like integrity, availability, and privacy. Unauthorized modification of files must not be possible, but this problem should be resolved.
Smit Kadvani   +4 more
openaire   +1 more source

Provably Secure Identity Based Provable Data Possession

2015
Provable Data Possession PDP, which enables cloud users to verify the integrity of their outsourced data without retrieving the entire file from cloud servers, is highly essential in secure cloud storage. A majority of the existing PDP schemes rely on the expensive Public Key Infrastructure PKI.
Yu, Yong   +4 more
openaire   +2 more sources

Towards comprehensive provable data possession in cloud computing

Wuhan University Journal of Natural Sciences, 2013
To check the remote data integrity in cloud computing, we have proposed an efficient and full data dynamic provable data possession (PDP) scheme that uses a SN (serial number)-BN (block number) table to support data block update. In this article, we first analyze and test its performance in detail. The result shows that our scheme is efficient with low
Chaoling Li   +3 more
openaire   +1 more source

Enhancement of provable data possession algorithm

AIP Conference Proceedings, 2023
K. Kishore Kumar   +3 more
openaire   +1 more source

A Provable Data Possession Scheme with Data Hierarchy in Cloud

2016
In recent years, numerous provable data possession PDP schemes have been proposed for checking the availability and integrity of data stored on cloud storage server CSS which is not fully trusted. However, these schemes do not work with specific subsets of verifiers, and they do not efficiently support dynamic enrollment and revocation of verifiers. In
Changlu Lin   +3 more
openaire   +1 more source

Delegable Provable Data Possession for Remote Data in the Clouds

2011
Many storage systems need to do authorized verification for data integrity. For example, a user stores his data into cloud storage servers and shares his data with his friends. They check data integrity periodically to ensure data intact. However, they don't want a stranger to check data integrity on their data.
Shiuan-Tzuo Shen, Wen-Guey Tzeng
openaire   +1 more source

An overview of real‐world data sources for oncology and considerations for research

Ca-A Cancer Journal for Clinicians, 2022
Lynne Penberthy   +2 more
exaly  

SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage

IEEE Transactions on Services Computing, 2021
Sanjeet Kumar Nayak, Somanath Tripathy
exaly  

Home - About - Disclaimer - Privacy