2018
DOI: 10.1155/2018/2615249
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature

Abstract: Cloud storage services allow users to outsource their data remotely to save their local storage space and enable them to manage resources on demand. However, once users outsourced their data to the remote cloud platform, they lose the physical control of the data. How to ensure the integrity of outsourced data is the major concern of cloud users and also is the main challenge in the cloud service deployment. Limited by the communication and computation overheads, traditional hash-based integrity verification s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
20
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(20 citation statements)
references
References 22 publications
0
20
0
Order By: Relevance
“…To further reduce the overhead costs, BLS-based tagging methods were proposed and the most notable ones are by Li et al [11] (the Li method), Liu et al [12] (the Liu method), Wang et al [17,30,31] (the Wang method), Yang et al [32] (the Yang method), Luo et al [13] (Luo_2 method) and Salim et al [14] (Salim Method). The BLS short signature [22] scheme, as indicated by its name, produces short signatures each having a typical length of 160 bits.…”
Section: Otfsb Based Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…To further reduce the overhead costs, BLS-based tagging methods were proposed and the most notable ones are by Li et al [11] (the Li method), Liu et al [12] (the Liu method), Wang et al [17,30,31] (the Wang method), Yang et al [32] (the Yang method), Luo et al [13] (Luo_2 method) and Salim et al [14] (Salim Method). The BLS short signature [22] scheme, as indicated by its name, produces short signatures each having a typical length of 160 bits.…”
Section: Otfsb Based Methodsmentioning
confidence: 99%
“…Over the past few years, a number of tagging methods have been proposed in the literature [3][4][5][6][7][8][9][10][11][12][13][14] to used in DIA, some [3][4][5][6][7] supporting private verifiability, while others [8][9][10][11][12][13][14] supporting public verifiability. The main focus of the existing work is on how to support public verifiability and/or to make the methods more secure or more efficient.…”
Section: Introductionmentioning
confidence: 99%
“…Xiling Luo et al [4] discussed An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature. A remote data integrity protection scheme is proposed that ensures public audibility, privacy protection, and blockless verification.…”
Section: Literature Surveymentioning
confidence: 99%
“…A recent work by Ren et al [28] in 2018 makes use of rb23Tree to prevent the cloud servers from manipulating some of the sensitive data and escaping from the integrity verification procedure. Luo et al in 2018 [29] proposed an efficient scheme using BLS short signatures which preserve the user privacy incurring only less computational and communication complexities. A very useful recent research work which involves the verification of the integrity audit of cloud data was proposed by Yan et al in 2019 [30].…”
Section: Literature Surveymentioning
confidence: 99%