Results 31 to 40 of about 7,587 (272)

I2PA : An Efficient ABC for IoT [PDF]

open access: yes, 2019
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz   +2 more
core   +4 more sources

Certificateless public key cryptography based provable data possession scheme in edge environment

open access: yesTongxin xuebao, 2022
In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the ...
Ziyuan WANG, Ruizhong DU
doaj   +2 more sources

Certificateless Provable Group Shared Data Possession with Comprehensive Privacy Preservation for Cloud Storage

open access: yesFuture Internet, 2018
Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data.
Hongbin Yang   +3 more
doaj   +1 more source

Certificateless Provable Data Possession Protocol for the Multiple Copies and Clouds Case

open access: yesIEEE Access, 2020
For user's extremely important data, storing multiple copies on cloud(s) may be a good option because even if the integrity of one or more copies is broken, it can still recover data from other intact ones, which increases the availability and durability
Genqing Bian, Jinyong Chang
doaj   +1 more source

Audit Method of Cloud Storage Data Possession Supporting Concurrent Update [PDF]

open access: yesJisuanji gongcheng, 2016
Audit of data possession is the key technique of ensuring the cloud data integrity,but the concurrent update operation makes the audit system efficiency dramatically decreased.Aiming at this problem,this paper proposes an audit method of cloud storage ...
WANG Huifeng,LI Zhanhuai,ZHANG Xiao,SUN Jian,ZHAO Xiaonan
doaj   +1 more source

Jurisdiction in Bankruptcy [PDF]

open access: yes, 1948
It has been argued that organic farming sustains a higher biodiversity than conventional farming. This might promote the ecosystem services that exist in agricultural landscapes such as pollination and pest control. Here, I examined the effect of farming
Mussman, William E.   +1 more
core   +3 more sources

An Effective Scheme for Provable Data Possession [PDF]

open access: yesProceedings of the 2016 International Conference on Intelligent Control and Computer Application, 2016
At present, almost all the provable data possession schemes require a large number of exponent calculations. In this paper a new scheme based on the homomorphy of NTRU algorithm is proposed. The scheme includes modules of Key Generation, Tag Generation, Challenge, Proof Generation, and Verification. This scheme requires only plus, minus, multiplication
Kun Yu, Mengdie Huang, Shanyue Bu
openaire   +1 more source

Cloud Data Auditing Using Proofs of Retrievability

open access: yes, 2017
Cloud servers offer data outsourcing facility to their clients. A client outsources her data without having any copy at her end. Therefore, she needs a guarantee that her data are not modified by the server which may be malicious.
Ruj, Sushmita, Sengupta, Binanda
core   +1 more source

Fuzzy identity-based data integrity auditing for reliable cloud storage systems [PDF]

open access: yes, 2016
This is the author accepted manuscript. The final version is available from the publisher via the DOI in this record.As a core security issue in reliable cloud storage, data integrity has received much attention.
Choo, K-KR   +5 more
core   +1 more source

Identity-based anonymous cloud auditing scheme with compact tags

open access: yes网络与信息安全学报, 2022
Cloud storage has the advantages of high efficiency and scalability.Users can save local storage cost and share data with others through cloud storage technology.However, when data is uploaded to cloud servers, its owner also loses the physical control ...
Chenxin LU   +4 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy