Results 31 to 40 of about 7,587 (272)
I2PA : An Efficient ABC for IoT [PDF]
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz +2 more
core +4 more sources
Certificateless public key cryptography based provable data possession scheme in edge environment
In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the ...
Ziyuan WANG, Ruizhong DU
doaj +2 more sources
Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data.
Hongbin Yang +3 more
doaj +1 more source
Certificateless Provable Data Possession Protocol for the Multiple Copies and Clouds Case
For user's extremely important data, storing multiple copies on cloud(s) may be a good option because even if the integrity of one or more copies is broken, it can still recover data from other intact ones, which increases the availability and durability
Genqing Bian, Jinyong Chang
doaj +1 more source
Audit Method of Cloud Storage Data Possession Supporting Concurrent Update [PDF]
Audit of data possession is the key technique of ensuring the cloud data integrity,but the concurrent update operation makes the audit system efficiency dramatically decreased.Aiming at this problem,this paper proposes an audit method of cloud storage ...
WANG Huifeng,LI Zhanhuai,ZHANG Xiao,SUN Jian,ZHAO Xiaonan
doaj +1 more source
Jurisdiction in Bankruptcy [PDF]
It has been argued that organic farming sustains a higher biodiversity than conventional farming. This might promote the ecosystem services that exist in agricultural landscapes such as pollination and pest control. Here, I examined the effect of farming
Mussman, William E. +1 more
core +3 more sources
An Effective Scheme for Provable Data Possession [PDF]
At present, almost all the provable data possession schemes require a large number of exponent calculations. In this paper a new scheme based on the homomorphy of NTRU algorithm is proposed. The scheme includes modules of Key Generation, Tag Generation, Challenge, Proof Generation, and Verification. This scheme requires only plus, minus, multiplication
Kun Yu, Mengdie Huang, Shanyue Bu
openaire +1 more source
Cloud Data Auditing Using Proofs of Retrievability
Cloud servers offer data outsourcing facility to their clients. A client outsources her data without having any copy at her end. Therefore, she needs a guarantee that her data are not modified by the server which may be malicious.
Ruj, Sushmita, Sengupta, Binanda
core +1 more source
Fuzzy identity-based data integrity auditing for reliable cloud storage systems [PDF]
This is the author accepted manuscript. The final version is available from the publisher via the DOI in this record.As a core security issue in reliable cloud storage, data integrity has received much attention.
Choo, K-KR +5 more
core +1 more source
Identity-based anonymous cloud auditing scheme with compact tags
Cloud storage has the advantages of high efficiency and scalability.Users can save local storage cost and share data with others through cloud storage technology.However, when data is uploaded to cloud servers, its owner also loses the physical control ...
Chenxin LU +4 more
doaj +3 more sources

