Results 1 to 10 of about 7,468 (159)
Provable Data Possession using Additive Homomorphic Encryption
Efficiency, public verification, and robustness are essential characteristics of data possession schemes. The efficiency of such kinds of Provable Data Possession (PDP) schemes is possible due to homomorphic encryption, which is used to verify the ...
Parth Shah, Priteshkumar Prajapati
doaj +2 more sources
Robust Provable Data Possession Protocol [PDF]
Provable data possession (PDP) is a technique for ensuring the validity of data in storage outsourcing. The main issue is how to frequently, efficiently verify that an untrusted server is correctly storing its client’s outsourced data.
Feng, Chao +3 more
core +3 more sources
An efficient and secure protocol for checking remote data integrity in multi-cloud environment [PDF]
In cloud environment, huge quantity of data has been generated at each and every second. In order to manage the data, cloud service provider makes use of multi-cloud platform to fulfill the requirement.
H. Anwarbasha +2 more
doaj +2 more sources
Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing [PDF]
Provable data possession (PDP) is a technique that enables the verification of data integrity in cloud storage without the need to download the data. PDP schemes are generally categorized into public and private verification.
Mengdi Zhao, Huiyan Chen
doaj +2 more sources
New provable data transfer from provable data possession and deletion for secure cloud storage [PDF]
With the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation.
Yudong Liu +3 more
doaj +2 more sources
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy [PDF]
Cloud storage services have become accessible and used by everyone. Nevertheless, stored data are dependable on the behavior of the cloud servers, and losses and damages often occur.
B Wang +12 more
core +4 more sources
Provable data possession scheme with authentication
To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme
Hao-xing LI +3 more
doaj +3 more sources
Provable data possession at untrusted stores [PDF]
We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs.
ATENIESE, GIUSEPPE +6 more
openaire +2 more sources
Remote data checking using provable data possession [PDF]
We introduce a model for provable data possession (PDP) that can be used for remote data checking: A client that has stored data at an untrusted server can verify that the server possesses the original data without retrieving it.
ATENIESE, GIUSEPPE +7 more
openaire +3 more sources
Dynamic Provable Data Possession [PDF]
As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has received increased attention. In the Provable Data Possession (PDP) model, the client preprocesses the data and then sends them to an untrusted server for storage while ...
Erway, C. Chris +3 more
openaire +2 more sources

