Results 1 to 10 of about 24,134 (292)
Certificateless public key cryptography based provable data possession scheme in edge environment
In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the ...
Ziyuan WANG, Ruizhong DU
doaj +2 more sources
Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data.
Hongbin Yang +3 more
doaj +1 more source
Certificateless Provable Data Possession Protocol for the Multiple Copies and Clouds Case
For user's extremely important data, storing multiple copies on cloud(s) may be a good option because even if the integrity of one or more copies is broken, it can still recover data from other intact ones, which increases the availability and durability
Genqing Bian, Jinyong Chang
doaj +1 more source
Audit Method of Cloud Storage Data Possession Supporting Concurrent Update [PDF]
Audit of data possession is the key technique of ensuring the cloud data integrity,but the concurrent update operation makes the audit system efficiency dramatically decreased.Aiming at this problem,this paper proposes an audit method of cloud storage ...
WANG Huifeng,LI Zhanhuai,ZHANG Xiao,SUN Jian,ZHAO Xiaonan
doaj +1 more source
An Effective Scheme for Provable Data Possession [PDF]
At present, almost all the provable data possession schemes require a large number of exponent calculations. In this paper a new scheme based on the homomorphy of NTRU algorithm is proposed. The scheme includes modules of Key Generation, Tag Generation, Challenge, Proof Generation, and Verification. This scheme requires only plus, minus, multiplication
Kun Yu, Mengdie Huang, Shanyue Bu
openaire +1 more source
Identity-based anonymous cloud auditing scheme with compact tags
Cloud storage has the advantages of high efficiency and scalability.Users can save local storage cost and share data with others through cloud storage technology.However, when data is uploaded to cloud servers, its owner also loses the physical control ...
Chenxin LU +4 more
doaj +3 more sources
Provable Data Possession with Outsourced Tag Generation for AI-Driven E-Commerce
: AI applications have become ubiquitous, bringing significant convenience to various industries. In e-commerce, AI can enhance product recommendations for individuals and provide businesses with more accurate predictions for market strategy development.
Yi Li +3 more
semanticscholar +1 more source
A Review on Secure Data Deduplication: Cloud Storage Security Issue
Cloud storage service providers caters to the need of organizations and individuals by allowing them to store, transfer and backup their ever-increasing amount of data at low cost along with providing access to the other resources of cloud. For providing
Priteshkumar Prajapati, Parth Shah
doaj +1 more source
Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud
To solve the problem of multi-source IoT data integrity verification, identity-based provable data possession for multi-source IoT terminal in public cloud (ID-MPDP) was proposed.Firstly, the formal definitions of system model and security model of ID ...
Huaqun WANG +3 more
doaj +2 more sources
Multi-replica provable data possession scheme supporting data dynamic updating
Considering the application demand of multiple replicas data security and data dynamic update,a multi-replica provable data possession scheme was proposed to supporting data dynamic updating.The original data file can be dynamically updated using dynamic
Long CHEN, Yu-zhu LUO
doaj +2 more sources

