Results 1 to 10 of about 7,468 (159)

Provable Data Possession using Additive Homomorphic Encryption

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Efficiency, public verification, and robustness are essential characteristics of data possession schemes. The efficiency of such kinds of Provable Data Possession (PDP) schemes is possible due to homomorphic encryption, which is used to verify the ...
Parth Shah, Priteshkumar Prajapati
doaj   +2 more sources

Robust Provable Data Possession Protocol [PDF]

open access: yesTELKOMNIKA Indonesian Journal of Electrical Engineering, 2014
Provable data possession (PDP) is a technique for ensuring the validity of data in storage outsourcing. The main issue is how to frequently, efficiently verify that an untrusted server is correctly storing its client’s outsourced data.
Feng, Chao   +3 more
core   +3 more sources

An efficient and secure protocol for checking remote data integrity in multi-cloud environment [PDF]

open access: yesScientific Reports, 2021
In cloud environment, huge quantity of data has been generated at each and every second. In order to manage the data, cloud service provider makes use of multi-cloud platform to fulfill the requirement.
H. Anwarbasha   +2 more
doaj   +2 more sources

Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing [PDF]

open access: yesEntropy
Provable data possession (PDP) is a technique that enables the verification of data integrity in cloud storage without the need to download the data. PDP schemes are generally categorized into public and private verification.
Mengdi Zhao, Huiyan Chen
doaj   +2 more sources

New provable data transfer from provable data possession and deletion for secure cloud storage [PDF]

open access: yesInternational Journal of Distributed Sensor Networks, 2019
With the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation.
Yudong Liu   +3 more
doaj   +2 more sources

Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy [PDF]

open access: yes, 2017
Cloud storage services have become accessible and used by everyone. Nevertheless, stored data are dependable on the behavior of the cloud servers, and losses and damages often occur.
B Wang   +12 more
core   +4 more sources

Provable data possession scheme with authentication

open access: yesTongxin xuebao, 2016
To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme
Hao-xing LI   +3 more
doaj   +3 more sources

Provable data possession at untrusted stores [PDF]

open access: yesProceedings of the 14th ACM conference on Computer and communications security, 2007
We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs.
ATENIESE, GIUSEPPE   +6 more
openaire   +2 more sources

Remote data checking using provable data possession [PDF]

open access: yesACM Transactions on Information and System Security, 2011
We introduce a model for provable data possession (PDP) that can be used for remote data checking: A client that has stored data at an untrusted server can verify that the server possesses the original data without retrieving it.
ATENIESE, GIUSEPPE   +7 more
openaire   +3 more sources

Dynamic Provable Data Possession [PDF]

open access: yesACM Transactions on Information and System Security, 2009
As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has received increased attention. In the Provable Data Possession (PDP) model, the client preprocesses the data and then sends them to an untrusted server for storage while ...
Erway, C. Chris   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy