Results 251 to 260 of about 24,134 (292)
Some of the next articles are maybe not open access.

A Non-repudiable Dynamic Provable Data Possession

2019
With the widespread popularity of cloud storage, cloud storage security issues have also received much attention. A provable data possession (PDP) scheme can effectively help users to verify the integrity of data stored remotely in the cloud. For this reason, the client’s PDP scheme is constantly improving and developing.
Jun-Feng Tian, Rui-Fang Guo, Xuan Jing
openaire   +1 more source

Towards comprehensive provable data possession in cloud computing

Wuhan University Journal of Natural Sciences, 2013
To check the remote data integrity in cloud computing, we have proposed an efficient and full data dynamic provable data possession (PDP) scheme that uses a SN (serial number)-BN (block number) table to support data block update. In this article, we first analyze and test its performance in detail. The result shows that our scheme is efficient with low
Chaoling Li   +3 more
openaire   +1 more source

Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession

IEEE Transactions on Services Computing, 2019
When the data is stored in public clouds, provable data possession (for short, PDP) is of crucial importance in cloud storage. PDP can make the users verify whether their outsourced data is kept intact without downloading the whole data.
Huaqun Wang   +3 more
semanticscholar   +1 more source

Secure Provable Data Possession for Object Storage System

2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Object storage system provides ocean space to hold a very large amount of data objects reliably and guarantee the clients to efficiently obtain their big data. In this paper, we propose a secure provable data possession scheme for object storage system, so as to enhance the security and efficiency through interactive verification and hierarchical ...
Zhefeng Zou   +3 more
openaire   +1 more source

Proxy Provable Data Possession in Public Clouds

IEEE Transactions on Services Computing, 2013
Recently, cloud computing rapidly expands as an alternative to conventional computing due to it can provide a flexible, dynamic and resilient infrastructure for both academic and business environments. In public cloud environment, the client moves its data to public cloud server (PCS) and cannot control its remote data. Thus, information security is an
openaire   +1 more source

Dynamic Provable Data Possession with batch-update verifiability

2012 IEEE International Conference on Intelligent Control, Automatic Detection and High-End Equipment, 2012
Cloud storage security has drawn more and more concerns in Cloud Computing literatures. The Provable Data Possession (PDP) model has been defined for ensuring the integrity of files on untrusted storages. Since cloud storage is practically not only used for storing static data, the Dynamic Provable Data Possession (DPDP) model has been put forward, in ...
Wang Junxiang, Liu Shengli
openaire   +1 more source

Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage

IEEE Transactions on Cloud Computing, 2019
To increase the availability and durability of the outsourced data, many customers store multiple copies on multiple cloud servers. To guarantee the integrity of multi-copies, some provable data possession (PDP) protocols for multi-copy are presented ...
Jiguo Li, Hao Yan, Yicheng Zhang
semanticscholar   +1 more source

Provable Data Possession Using Identity-Based Encryption

2018
Nowadays, we have many remote data storage systems available which allow clients to store their data on remote server. But these systems possess many security problems like integrity, availability, and privacy. Unauthorized modification of files must not be possible, but this problem should be resolved.
Smit Kadvani   +4 more
openaire   +1 more source

PDPMT: Provable data possession for multiple cloud tenants

2017 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), 2017
Existing provable data possession mechanisms mainly focus on the single-cloud-tenant scenario. When extended to multiple-cloud-tenant scenario, they are infeasible to be deployed in real world due to extremely high computation costs arising from processing a large volume of data.
Daoli Huang, Changsheng Wan
openaire   +1 more source

Improved Provable Data Transfer from Provable Data Possession and Deletion in Cloud Storage

2018
Due to the limited computational resources of data owners and the developments in cloud computing, more and more data owners choose to store data on the cloud to reduce their own storage burden. When the data owner wants to re-select a new cloud service provider, the data needs to be transmitted from Cloud A to Cloud B. How to ensure that data has been
Yudong Liu   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy