2020
DOI: 10.1016/j.cose.2019.101686
|View full text |Cite
|
Sign up to set email alerts
|

An integrity verification scheme of cloud storage for internet-of-things mobile terminal devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 38 publications
(19 citation statements)
references
References 18 publications
0
15
0
Order By: Relevance
“…Zhang [19] proposed a cloud storage auditing for shared big data. In 2020, Lu [20] propose an integrity verification scheme for Internet of Things (IoT) mobile terminal devices. In the scheme, block-tag generation and integrity verification operations are executed at third-party auditor (TPA) side, which achieves lightweight operations of data owners.…”
Section: The Related Workmentioning
confidence: 99%
“…Zhang [19] proposed a cloud storage auditing for shared big data. In 2020, Lu [20] propose an integrity verification scheme for Internet of Things (IoT) mobile terminal devices. In the scheme, block-tag generation and integrity verification operations are executed at third-party auditor (TPA) side, which achieves lightweight operations of data owners.…”
Section: The Related Workmentioning
confidence: 99%
“…The properties of algebraic signature allows cloud to return a sum of the selected blocks in the proof instead of the original data file, which saves the bandwidth between the cloud and the verifier and make the algebraic signature suited for cloud computing [42]. Nowadays, more and more schemes [23,[43][44][45][46][47][48][49][50][51][52] on cloud computing security are put forward to achieve great advantages.…”
Section: The Related Workmentioning
confidence: 99%
“…erefore, many researchers have dedicated their research to data security in sharing scenarios. e works in [3][4][5][6] solve the data access control for data sharing in various scenarios and the proposals in [7][8][9][10] focus on the data integrity verification and public auditing. However, as the scale of data and services in the cloud grows, the multiple group data sharing emerges as a promising application for data sharing between users in different groups [11][12][13], such as multiple health study organizations and multiple businesses.…”
Section: Introductionmentioning
confidence: 99%