2020
DOI: 10.1016/j.future.2020.03.032
|View full text |Cite
|
Sign up to set email alerts
|

An efficient data integrity auditing protocol for cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 74 publications
(39 citation statements)
references
References 32 publications
0
31
0
1
Order By: Relevance
“…Now, we analyze the probability that B can guess the correct query of the target data block by simulating operation. Similar to the analysis and proof of [48,50], B only halts two queries on partial key query and tag query; therefore the probability of B implementing the queries is higher than (1 − c) q p +q T . Assume that the probability of occurrence of output of the right value of g ab for B is ε…”
Section: Security Analysismentioning
confidence: 91%
“…Now, we analyze the probability that B can guess the correct query of the target data block by simulating operation. Similar to the analysis and proof of [48,50], B only halts two queries on partial key query and tag query; therefore the probability of B implementing the queries is higher than (1 − c) q p +q T . Assume that the probability of occurrence of output of the right value of g ab for B is ε…”
Section: Security Analysismentioning
confidence: 91%
“…Garg et al [32] proposed an efficient model for data integrity auditing cloud computing. The purpose of proposing this protocol is to reduce the computational complexity of client during system setup phase of the auditing protocol.…”
Section: E Cloud Burst Techniquementioning
confidence: 99%
“…Garg et al [32] 2020 reduce the computational complexity of client during system setup phase of the auditing protocol an efficient model for data integrity auditing cloud computing which its security relies upon the stability CDHP in a Random Oracle Model (ROM).…”
Section: Asadi Et Al [31] 2019mentioning
confidence: 99%
“…Based on this, Wang et al [18] proposed a relatively complete protocol which can support data update, user privacy protection, and batch auditing, but it will lead to the problem of high computing cost on the client side. Then, Garg et al [19] designed a protocol that can minimize the computational complexity for the client during the system setup phase, which is publicly verifiable and supports dynamic operations on data.…”
Section: Related Workmentioning
confidence: 99%