Results 11 to 20 of about 7,587 (272)

IntegrityChain: Provable Data Possession for Decentralized Storage

open access: yesIEEE Journal on Selected Areas in Communications, 2020
Outsourced storage enables data owners to host their data on remote storage resources without keeping a local copy so as to target their core business. However, a serious problem is data integrity in the sense that data owners lose their physical control over the remote-stored data.
Yannan Li   +4 more
openaire   +5 more sources

Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage

open access: yesIEEE Access, 2019
Cloud computing is a burgeoning paradigm that offers reliable and adaptive infrastructure to the data owner who shares his data with the data user through the cloud server.
Yang Ming, Wenchang Shi
doaj   +3 more sources

Online/Offline Provable Data Possession

open access: yesIEEE Transactions on Information Forensics and Security, 2017
Provable data possession (PDP) allows a user to outsource data with a guarantee that the integrity can be efficiently verified. Existing publicly verifiable PDP schemes require the user to perform expensive computations, such as modular exponentiations for processing data before outsourcing to the storage server, which is not desirable for weak users ...
Yujue Wang   +4 more
openaire   +5 more sources

Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems

open access: yesInternational Journal of Distributed Sensor Networks, 2022
The smart grid is considered to be the next-generation electric power network. In a smart grid, there are massive data to be processed, so cloud computing is introduced into it to form a cloud-based smart grid data management system.
Caixue Zhou, Lihua Wang, Lingmin Wang
doaj   +1 more source

Robust Dynamic Provable Data Possession [PDF]

open access: yes2012 32nd International Conference on Distributed Computing Systems Workshops, 2012
Remote Data Checking (RDC) allows clients to efficiently check the integrity of data stored at untrusted servers. This allows data owners to assess the risk of outsourcing data in the cloud, making RDC a valuable tool for data auditing. A robust RDC scheme incorporates mechanisms to mitigate arbitrary amounts of data corruption.
Bo Chen, Reza Curtmola
openaire   +1 more source

MR-PDP: Multiple-Replica Provable Data Possession [PDF]

open access: yes2008 The 28th International Conference on Distributed Computing Systems, 2008
Many storage systems rely on replication to increase the availability and durability of data on untrusted storage systems. At present, such storage systems provide no strong evidence that multiple copies of the data are actually stored. Storage servers can collude to make it look like they are storing many copies of the data, whereas in reality they ...
Reza Curtmola   +3 more
openaire   +2 more sources

A Distributed and Decentralized Certificateless Framework for Reliable Shared Data Auditing for FOG-CPS Networks

open access: yesIEEE Access, 2023
FOG computing enhances communication efficiency by processing data at the network’s edge. In many critical infrastructure (CI) networks, user entities outsource data to the FOG server, but the reliability of the data is a concern.
Manohar Sai Burra, Soumyadev Maity
doaj   +1 more source

Provable Data Possession Using Sigma-protocols [PDF]

open access: yes2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012
We introduce a scheme for Provable Data Possession (PDP) that allows a client which has stored data at an untrusted server to verify that the server possesses the original data that it stored without retrieving it. This work is the first attempt to build a PDP scheme using the concept of sigma protocols.
Akshaya Mohan, Rajendra Katti
openaire   +1 more source

On Coding for Cooperative Data Exchange [PDF]

open access: yes, 2010
We consider the problem of data exchange by a group of closely-located wireless nodes. In this problem each node holds a set of packets and needs to obtain all the packets held by other nodes. Each of the nodes can broadcast the packets in its possession
Rouayheb, Salim El   +2 more
core   +1 more source

Stern–Brocot-Based Non-Repudiation Dynamic Provable Data Possession

open access: yesIEEE Access, 2019
With the widespread popularity of cloud storage, cloud storage security issues have also received much attention. A provable data possession (PDP) scheme can effectively help users to verify the integrity of data stored remotely in the cloud.
Junfeng Tian, Guo Ruifang, Xuan Jing
doaj   +1 more source

Home - About - Disclaimer - Privacy