Results 21 to 30 of about 24,134 (292)

Blockchain-Empowered Keyword Searchable Provable Data Possession for Large Similar Data

open access: yesIEEE Transactions on Information Forensics and Security
Provable Data Possession (PDP) is an alternative technique that guarantees the integrity of remote data. However, most current PDP schemes are inapplicable to similarity-like data checking with the same attribute, i.e., when there are numerous similar files to be checked by Data Owners (DOs).
Ying Miao   +5 more
openaire   +3 more sources

Remote data checking using provable data possession [PDF]

open access: yesACM Transactions on Information and System Security, 2011
We introduce a model for provable data possession (PDP) that can be used for remote data checking: A client that has stored data at an untrusted server can verify that the server possesses the original data without retrieving it.
ATENIESE, GIUSEPPE   +7 more
openaire   +3 more sources

Dynamic Provable Data Possession [PDF]

open access: yesACM Transactions on Information and System Security, 2009
As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has received increased attention. In the Provable Data Possession (PDP) model, the client preprocesses the data and then sends them to an untrusted server for storage while ...
Erway, C. Chris   +3 more
openaire   +2 more sources

Robust Dynamic Provable Data Possession [PDF]

open access: yes2012 32nd International Conference on Distributed Computing Systems Workshops, 2012
Remote Data Checking (RDC) allows clients to efficiently check the integrity of data stored at untrusted servers. This allows data owners to assess the risk of outsourcing data in the cloud, making RDC a valuable tool for data auditing. A robust RDC scheme incorporates mechanisms to mitigate arbitrary amounts of data corruption.
Bo Chen, Reza Curtmola
openaire   +1 more source

MR-PDP: Multiple-Replica Provable Data Possession [PDF]

open access: yes2008 The 28th International Conference on Distributed Computing Systems, 2008
Many storage systems rely on replication to increase the availability and durability of data on untrusted storage systems. At present, such storage systems provide no strong evidence that multiple copies of the data are actually stored. Storage servers can collude to make it look like they are storing many copies of the data, whereas in reality they ...
Reza Curtmola   +3 more
openaire   +2 more sources

A Distributed and Decentralized Certificateless Framework for Reliable Shared Data Auditing for FOG-CPS Networks

open access: yesIEEE Access, 2023
FOG computing enhances communication efficiency by processing data at the network’s edge. In many critical infrastructure (CI) networks, user entities outsource data to the FOG server, but the reliability of the data is a concern.
Manohar Sai Burra, Soumyadev Maity
doaj   +1 more source

IntegrityChain: Provable Data Possession for Decentralized Storage

open access: yesIEEE Journal on Selected Areas in Communications, 2020
Outsourced storage enables data owners to host their data on remote storage resources without keeping a local copy so as to target their core business. However, a serious problem is data integrity in the sense that data owners lose their physical control over the remote-stored data.
Yannan Li   +4 more
openaire   +3 more sources

Provable Data Possession Using Sigma-protocols [PDF]

open access: yes2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012
We introduce a scheme for Provable Data Possession (PDP) that allows a client which has stored data at an untrusted server to verify that the server possesses the original data that it stored without retrieving it. This work is the first attempt to build a PDP scheme using the concept of sigma protocols.
Akshaya Mohan, Rajendra Katti
openaire   +1 more source

Post-Quantum Privacy-Preserving Provable Data Possession Scheme Based on Smart Contracts

open access: yesWireless Communications and Mobile Computing, 2023
Provable data possession (PDP) is a crucial means of protecting the integrity of data in the domain of cloud storage. In the post-quantum era, the PDP scheme that uses lattices relies too heavily on the third-party auditor (TPA), which is not entirely ...
Zhengwen Li   +4 more
semanticscholar   +1 more source

A collusion-resistant certificateless provable data possession scheme for shared data with user revocation

open access: yesCluster Computing, 2023
Cloud storage service can provide a lot convenience for users to collect, store and share data within a group. However, there are some secure issues, one of which is that the cloud server may cheat users for a good reputation when the data is lost.
Guang Yang   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy