Results 21 to 30 of about 7,587 (272)

Dynamic Multiple-Replica Provable Data Possession in Cloud Storage System

open access: yesIEEE Access, 2020
In cloud storage scenarios, data security has received considerably more attention than before. To ensure the reliability and availability of outsourced data and improve disaster resilience and data recovery ability, important data files possessed by ...
Yilin Yuan, Jianbiao Zhang, Wanshan Xu
doaj   +1 more source

Identity-Based Public Multi-Replica Provable Data Possession

open access: yesIEEE Access, 2017
Cloud storage has been gaining tremendous popularity, which provides facilitative data storage and sharing services for distributed clients. To maximize the availability and reliability, some customers may store multiple replicas of critical data on ...
Su Peng   +4 more
doaj   +1 more source

Towards Lightweight Provable Data Possession for Cloud Storage Using Indistinguishability Obfuscation

open access: yesIEEE Access, 2022
Cloud Computing has proved to be a boon for many individuals and organizations who cannot afford infrastructure and maintenance cost of resources. But the untrusted nature of Cloud Server (CS) brings many challenges related to security and trust.
Smita Chaudhari, Gandharba Swain
doaj   +1 more source

Entangled cloud storage [PDF]

open access: yes, 2016
Entangled cloud storage (Aspnes et al., ESORICS 2004) enables a set of clients to “entangle” their files into a single clew to be stored by a (potentially malicious) cloud provider.
Ateniese, Giuseppe   +3 more
core   +1 more source

Proxy Provable Data Possession with Key-exposure Resilient [PDF]

open access: yesJisuanji kexue
More and more clients would like to store their data to public cloud server along with the rapid development of cloud storage.To check the integrity of remote data,researchers proposed provable data possession(PDP).In some cases,the client will be ...
AN Ruicheng, WANG Huaqun
doaj   +1 more source

Cloud Storage File Recoverability [PDF]

open access: yes, 2017
Data loss is perceived as one of the major threats for cloud storage. Consequently, the security community developed several challenge-response protocols that allow a user to remotely verify whether an outsourced file is still intact.
Armknecht, Frederik   +3 more
core   +2 more sources

Identity-based Key-insulated Provable Multi-copy Data Possession in Multi-cloud Storage [PDF]

open access: yesJisuanji kexue
Provable data possession(PDP) allows users to verify that their outsourced data is intact without downloading all the data.To improve the availability and security of outsourced data,many users store multiple copies of their data on a single server.In ...
ZHOU Jie, WANG Huaqun
doaj   +1 more source

Cryptographic Accumulator-Based Scheme for Critical Data Integrity Verification in Cloud Storage

open access: yesIEEE Access, 2019
Public cloud storage is a fundamental cloud computing service. Currently, most owners of large data outsource their data to cloud storage services-even high-profile owners such as governments.
Walid I. Khedr   +2 more
doaj   +1 more source

Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage [PDF]

open access: yes, 2017
This is the author accepted manuscript. The final version is available from the publisher via the DOI in this record.Remote data integrity checking (RDIC) enables a data storage server, such as a cloud server, to prove to a verifier that it is actually
Ateniese, G   +6 more
core   +2 more sources

Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud

open access: yesIEEE Access, 2019
He et al. proposed a certificateless provable data possession protocol for big data storage on cloud. They claimed that the scheme is not only secure, but also can achieve data integrity checking without downloading the stored data from the cloud server.
Yongjian Liao   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy