Results 11 to 20 of about 24,134 (292)
Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing [PDF]
Provable data possession (PDP) is a technique that enables the verification of data integrity in cloud storage without the need to download the data. PDP schemes are generally categorized into public and private verification.
Mengdi Zhao, Huiyan Chen
doaj +3 more sources
Provable data possession at untrusted stores [PDF]
We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs.
ATENIESE, GIUSEPPE +6 more
openaire +3 more sources
The smart grid is considered to be the next-generation electric power network. In a smart grid, there are massive data to be processed, so cloud computing is introduced into it to form a cloud-based smart grid data management system.
Caixue Zhou, Lihua Wang, Lingmin Wang
doaj +2 more sources
Provable Data Possession using Additive Homomorphic Encryption
Efficiency, public verification, and robustness are essential characteristics of data possession schemes. The efficiency of such kinds of Provable Data Possession (PDP) schemes is possible due to homomorphic encryption, which is used to verify the ...
Parth Shah, Priteshkumar Prajapati
doaj +2 more sources
DBT-PDP: Provable data possession with outsourced data batch transfer based on blockchain
In the scenario of large-scale data ownership transactions, existing data integrity auditing schemes are faced with security risks from malicious third-party auditors and are inefficient in both calculation and communication, which greatly affects their ...
Chengming Yi +3 more
doaj +2 more sources
An efficient and secure protocol for checking remote data integrity in multi-cloud environment [PDF]
In cloud environment, huge quantity of data has been generated at each and every second. In order to manage the data, cloud service provider makes use of multi-cloud platform to fulfill the requirement.
H. Anwarbasha +2 more
doaj +2 more sources
Cloud Computing has proved to be a boon for many individuals and organizations who cannot afford infrastructure and maintenance cost of resources. But the untrusted nature of Cloud Server (CS) brings many challenges related to security and trust.
Smita Chaudhari, Gandharba Swain
doaj +2 more sources
New provable data transfer from provable data possession and deletion for secure cloud storage [PDF]
With the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation.
Yudong Liu +3 more
doaj +2 more sources
Provable data possession scheme with authentication
To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme
Hao-xing LI +3 more
doaj +3 more sources
Certificateless Provable Data Possession Scheme for Cloud-Based Electronic Health Records System
Electronic Health Records (EHRs: digital compilations of patient health status and diagnosis) are typically shared, analyzed, and stored on cloud servers.
Yujie Wu, Xiao Tan, Qi Xie
doaj +2 more sources

