Results 1 to 10 of about 24,134 (292)

Certificateless public key cryptography based provable data possession scheme in edge environment

open access: yesTongxin xuebao, 2022
In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the ...
Ziyuan WANG, Ruizhong DU
doaj   +2 more sources

Certificateless Provable Group Shared Data Possession with Comprehensive Privacy Preservation for Cloud Storage

open access: yesFuture Internet, 2018
Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data.
Hongbin Yang   +3 more
doaj   +1 more source

Certificateless Provable Data Possession Protocol for the Multiple Copies and Clouds Case

open access: yesIEEE Access, 2020
For user's extremely important data, storing multiple copies on cloud(s) may be a good option because even if the integrity of one or more copies is broken, it can still recover data from other intact ones, which increases the availability and durability
Genqing Bian, Jinyong Chang
doaj   +1 more source

Audit Method of Cloud Storage Data Possession Supporting Concurrent Update [PDF]

open access: yesJisuanji gongcheng, 2016
Audit of data possession is the key technique of ensuring the cloud data integrity,but the concurrent update operation makes the audit system efficiency dramatically decreased.Aiming at this problem,this paper proposes an audit method of cloud storage ...
WANG Huifeng,LI Zhanhuai,ZHANG Xiao,SUN Jian,ZHAO Xiaonan
doaj   +1 more source

An Effective Scheme for Provable Data Possession [PDF]

open access: yesProceedings of the 2016 International Conference on Intelligent Control and Computer Application, 2016
At present, almost all the provable data possession schemes require a large number of exponent calculations. In this paper a new scheme based on the homomorphy of NTRU algorithm is proposed. The scheme includes modules of Key Generation, Tag Generation, Challenge, Proof Generation, and Verification. This scheme requires only plus, minus, multiplication
Kun Yu, Mengdie Huang, Shanyue Bu
openaire   +1 more source

Identity-based anonymous cloud auditing scheme with compact tags

open access: yes网络与信息安全学报, 2022
Cloud storage has the advantages of high efficiency and scalability.Users can save local storage cost and share data with others through cloud storage technology.However, when data is uploaded to cloud servers, its owner also loses the physical control ...
Chenxin LU   +4 more
doaj   +3 more sources

Provable Data Possession with Outsourced Tag Generation for AI-Driven E-Commerce

open access: yesComputers, Materials & Continua
: AI applications have become ubiquitous, bringing significant convenience to various industries. In e-commerce, AI can enhance product recommendations for individuals and provide businesses with more accurate predictions for market strategy development.
Yi Li   +3 more
semanticscholar   +1 more source

A Review on Secure Data Deduplication: Cloud Storage Security Issue

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Cloud storage service providers caters to the need of organizations and individuals by allowing them to store, transfer and backup their ever-increasing amount of data at low cost along with providing access to the other resources of cloud. For providing
Priteshkumar Prajapati, Parth Shah
doaj   +1 more source

Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud

open access: yesTongxin xuebao, 2021
To solve the problem of multi-source IoT data integrity verification, identity-based provable data possession for multi-source IoT terminal in public cloud (ID-MPDP) was proposed.Firstly, the formal definitions of system model and security model of ID ...
Huaqun WANG   +3 more
doaj   +2 more sources

Multi-replica provable data possession scheme supporting data dynamic updating

open access: yesTongxin xuebao, 2014
Considering the application demand of multiple replicas data security and data dynamic update,a multi-replica provable data possession scheme was proposed to supporting data dynamic updating.The original data file can be dynamically updated using dynamic
Long CHEN, Yu-zhu LUO
doaj   +2 more sources

Home - About - Disclaimer - Privacy