Results 251 to 260 of about 24,134 (292)
Some of the next articles are maybe not open access.
A Non-repudiable Dynamic Provable Data Possession
2019With the widespread popularity of cloud storage, cloud storage security issues have also received much attention. A provable data possession (PDP) scheme can effectively help users to verify the integrity of data stored remotely in the cloud. For this reason, the client’s PDP scheme is constantly improving and developing.
Jun-Feng Tian, Rui-Fang Guo, Xuan Jing
openaire +1 more source
Towards comprehensive provable data possession in cloud computing
Wuhan University Journal of Natural Sciences, 2013To check the remote data integrity in cloud computing, we have proposed an efficient and full data dynamic provable data possession (PDP) scheme that uses a SN (serial number)-BN (block number) table to support data block update. In this article, we first analyze and test its performance in detail. The result shows that our scheme is efficient with low
Chaoling Li +3 more
openaire +1 more source
Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession
IEEE Transactions on Services Computing, 2019When the data is stored in public clouds, provable data possession (for short, PDP) is of crucial importance in cloud storage. PDP can make the users verify whether their outsourced data is kept intact without downloading the whole data.
Huaqun Wang +3 more
semanticscholar +1 more source
Secure Provable Data Possession for Object Storage System
2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012Object storage system provides ocean space to hold a very large amount of data objects reliably and guarantee the clients to efficiently obtain their big data. In this paper, we propose a secure provable data possession scheme for object storage system, so as to enhance the security and efficiency through interactive verification and hierarchical ...
Zhefeng Zou +3 more
openaire +1 more source
Proxy Provable Data Possession in Public Clouds
IEEE Transactions on Services Computing, 2013Recently, cloud computing rapidly expands as an alternative to conventional computing due to it can provide a flexible, dynamic and resilient infrastructure for both academic and business environments. In public cloud environment, the client moves its data to public cloud server (PCS) and cannot control its remote data. Thus, information security is an
openaire +1 more source
Dynamic Provable Data Possession with batch-update verifiability
2012 IEEE International Conference on Intelligent Control, Automatic Detection and High-End Equipment, 2012Cloud storage security has drawn more and more concerns in Cloud Computing literatures. The Provable Data Possession (PDP) model has been defined for ensuring the integrity of files on untrusted storages. Since cloud storage is practically not only used for storing static data, the Dynamic Provable Data Possession (DPDP) model has been put forward, in ...
Wang Junxiang, Liu Shengli
openaire +1 more source
Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage
IEEE Transactions on Cloud Computing, 2019To increase the availability and durability of the outsourced data, many customers store multiple copies on multiple cloud servers. To guarantee the integrity of multi-copies, some provable data possession (PDP) protocols for multi-copy are presented ...
Jiguo Li, Hao Yan, Yicheng Zhang
semanticscholar +1 more source
Provable Data Possession Using Identity-Based Encryption
2018Nowadays, we have many remote data storage systems available which allow clients to store their data on remote server. But these systems possess many security problems like integrity, availability, and privacy. Unauthorized modification of files must not be possible, but this problem should be resolved.
Smit Kadvani +4 more
openaire +1 more source
PDPMT: Provable data possession for multiple cloud tenants
2017 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), 2017Existing provable data possession mechanisms mainly focus on the single-cloud-tenant scenario. When extended to multiple-cloud-tenant scenario, they are infeasible to be deployed in real world due to extremely high computation costs arising from processing a large volume of data.
Daoli Huang, Changsheng Wan
openaire +1 more source
Improved Provable Data Transfer from Provable Data Possession and Deletion in Cloud Storage
2018Due to the limited computational resources of data owners and the developments in cloud computing, more and more data owners choose to store data on the cloud to reduce their own storage burden. When the data owner wants to re-select a new cloud service provider, the data needs to be transmitted from Cloud A to Cloud B. How to ensure that data has been
Yudong Liu +4 more
openaire +1 more source

