Results 11 to 20 of about 7,587 (272)
IntegrityChain: Provable Data Possession for Decentralized Storage
Outsourced storage enables data owners to host their data on remote storage resources without keeping a local copy so as to target their core business. However, a serious problem is data integrity in the sense that data owners lose their physical control over the remote-stored data.
Yannan Li +4 more
openaire +5 more sources
Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage
Cloud computing is a burgeoning paradigm that offers reliable and adaptive infrastructure to the data owner who shares his data with the data user through the cloud server.
Yang Ming, Wenchang Shi
doaj +3 more sources
Online/Offline Provable Data Possession
Provable data possession (PDP) allows a user to outsource data with a guarantee that the integrity can be efficiently verified. Existing publicly verifiable PDP schemes require the user to perform expensive computations, such as modular exponentiations for processing data before outsourcing to the storage server, which is not desirable for weak users ...
Yujue Wang +4 more
openaire +5 more sources
The smart grid is considered to be the next-generation electric power network. In a smart grid, there are massive data to be processed, so cloud computing is introduced into it to form a cloud-based smart grid data management system.
Caixue Zhou, Lihua Wang, Lingmin Wang
doaj +1 more source
Robust Dynamic Provable Data Possession [PDF]
Remote Data Checking (RDC) allows clients to efficiently check the integrity of data stored at untrusted servers. This allows data owners to assess the risk of outsourcing data in the cloud, making RDC a valuable tool for data auditing. A robust RDC scheme incorporates mechanisms to mitigate arbitrary amounts of data corruption.
Bo Chen, Reza Curtmola
openaire +1 more source
MR-PDP: Multiple-Replica Provable Data Possession [PDF]
Many storage systems rely on replication to increase the availability and durability of data on untrusted storage systems. At present, such storage systems provide no strong evidence that multiple copies of the data are actually stored. Storage servers can collude to make it look like they are storing many copies of the data, whereas in reality they ...
Reza Curtmola +3 more
openaire +2 more sources
FOG computing enhances communication efficiency by processing data at the network’s edge. In many critical infrastructure (CI) networks, user entities outsource data to the FOG server, but the reliability of the data is a concern.
Manohar Sai Burra, Soumyadev Maity
doaj +1 more source
Provable Data Possession Using Sigma-protocols [PDF]
We introduce a scheme for Provable Data Possession (PDP) that allows a client which has stored data at an untrusted server to verify that the server possesses the original data that it stored without retrieving it. This work is the first attempt to build a PDP scheme using the concept of sigma protocols.
Akshaya Mohan, Rajendra Katti
openaire +1 more source
On Coding for Cooperative Data Exchange [PDF]
We consider the problem of data exchange by a group of closely-located wireless nodes. In this problem each node holds a set of packets and needs to obtain all the packets held by other nodes. Each of the nodes can broadcast the packets in its possession
Rouayheb, Salim El +2 more
core +1 more source
Stern–Brocot-Based Non-Repudiation Dynamic Provable Data Possession
With the widespread popularity of cloud storage, cloud storage security issues have also received much attention. A provable data possession (PDP) scheme can effectively help users to verify the integrity of data stored remotely in the cloud.
Junfeng Tian, Guo Ruifang, Xuan Jing
doaj +1 more source

