2020
DOI: 10.1371/journal.pone.0241236
|View full text |Cite
|
Sign up to set email alerts
|

An effective, secure and efficient tagging method for integrity protection of outsourced data in a public cloud storage

Abstract: Data Integrity Auditing (DIA) is a security service for checking the integrity of data stored in a PCS (Public Cloud Storage), a third-party based storage service. A DIA service is provided by using integrity tags (hereafter referred to tags). This paper proposes a novel tagging method, called Tagging of Outsourced Data (TOD), for generating and verifying tags of files. TOD has a number of unique properties: (i) it supports both public and private verifiability, and achieves this property with a low level of o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 41 publications
0
5
0
Order By: Relevance
“…ALmarwani et al [22] proposed a novel tagging approach called Tagging of Outsourced Data (TOD) to secure the privacy of data stored in the cloud. By employing verification, their plan supported cloud data.…”
Section: Related Workmentioning
confidence: 99%
“…ALmarwani et al [22] proposed a novel tagging approach called Tagging of Outsourced Data (TOD) to secure the privacy of data stored in the cloud. By employing verification, their plan supported cloud data.…”
Section: Related Workmentioning
confidence: 99%
“…ALmarwani et al [ 21 ] presented a unique tagging approach called Tagging of Outsourced Data (TOD) in an endeavor to protect the secrecy of data stored in the cloud. Their method supported cloud data through verification.…”
Section: 0 Literature Reviewmentioning
confidence: 99%
“…Based on the threat analysis in [ 37 ] and usecase study, we have specified a set of requirements for the design of an effective, secure, reliable and efficient DIA. The requirements can be classified into four groups, functional, security, reliability and performance requirements.…”
Section: Requirement Specificationmentioning
confidence: 99%
“…TOD has been described, analysed and evaluated in detail in [ 37 ]. As TOD is used as a building block in DIA-MTTP, we here provide a summary of the TOD method.…”
Section: Building Blocksmentioning
confidence: 99%