Results 11 to 20 of about 24,134 (292)

Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing [PDF]

open access: yesEntropy
Provable data possession (PDP) is a technique that enables the verification of data integrity in cloud storage without the need to download the data. PDP schemes are generally categorized into public and private verification.
Mengdi Zhao, Huiyan Chen
doaj   +3 more sources

Provable data possession at untrusted stores [PDF]

open access: yesProceedings of the 14th ACM conference on Computer and communications security, 2007
We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs.
ATENIESE, GIUSEPPE   +6 more
openaire   +3 more sources

Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems

open access: yesInternational Journal of Distributed Sensor Networks, 2022
The smart grid is considered to be the next-generation electric power network. In a smart grid, there are massive data to be processed, so cloud computing is introduced into it to form a cloud-based smart grid data management system.
Caixue Zhou, Lihua Wang, Lingmin Wang
doaj   +2 more sources

Provable Data Possession using Additive Homomorphic Encryption

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Efficiency, public verification, and robustness are essential characteristics of data possession schemes. The efficiency of such kinds of Provable Data Possession (PDP) schemes is possible due to homomorphic encryption, which is used to verify the ...
Parth Shah, Priteshkumar Prajapati
doaj   +2 more sources

DBT-PDP: Provable data possession with outsourced data batch transfer based on blockchain

open access: yesHigh-Confidence Computing, 2023
In the scenario of large-scale data ownership transactions, existing data integrity auditing schemes are faced with security risks from malicious third-party auditors and are inefficient in both calculation and communication, which greatly affects their ...
Chengming Yi   +3 more
doaj   +2 more sources

An efficient and secure protocol for checking remote data integrity in multi-cloud environment [PDF]

open access: yesScientific Reports, 2021
In cloud environment, huge quantity of data has been generated at each and every second. In order to manage the data, cloud service provider makes use of multi-cloud platform to fulfill the requirement.
H. Anwarbasha   +2 more
doaj   +2 more sources

Towards Lightweight Provable Data Possession for Cloud Storage Using Indistinguishability Obfuscation

open access: yesIEEE Access, 2022
Cloud Computing has proved to be a boon for many individuals and organizations who cannot afford infrastructure and maintenance cost of resources. But the untrusted nature of Cloud Server (CS) brings many challenges related to security and trust.
Smita Chaudhari, Gandharba Swain
doaj   +2 more sources

New provable data transfer from provable data possession and deletion for secure cloud storage [PDF]

open access: yesInternational Journal of Distributed Sensor Networks, 2019
With the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation.
Yudong Liu   +3 more
doaj   +2 more sources

Provable data possession scheme with authentication

open access: yesTongxin xuebao, 2016
To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme
Hao-xing LI   +3 more
doaj   +3 more sources

Certificateless Provable Data Possession Scheme for Cloud-Based Electronic Health Records System

open access: yesMathematics
Electronic Health Records (EHRs: digital compilations of patient health status and diagnosis) are typically shared, analyzed, and stored on cloud servers.
Yujie Wu, Xiao Tan, Qi Xie
doaj   +2 more sources

Home - About - Disclaimer - Privacy