2020
DOI: 10.1007/s12652-020-02302-6
|View full text |Cite
|
Sign up to set email alerts
|

Attribute-based public integrity auditing for shared data with efficient user revocation in cloud storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 44 publications
0
14
0
Order By: Relevance
“…The time required, in seconds, to implement our MBCS scheme is computed in terms of steps required for its execution for every user (Gudeme et al. 2020 ; Peng et al. 2021 ; Kaur and Khanna 2020 ) where each biometric is an M by N image as enumerated below.…”
Section: Discussion Of Results and Complexity Evaluationmentioning
confidence: 99%
See 2 more Smart Citations
“…The time required, in seconds, to implement our MBCS scheme is computed in terms of steps required for its execution for every user (Gudeme et al. 2020 ; Peng et al. 2021 ; Kaur and Khanna 2020 ) where each biometric is an M by N image as enumerated below.…”
Section: Discussion Of Results and Complexity Evaluationmentioning
confidence: 99%
“…Furthermore, more recently, human biometrics are assuming important roles in engineering technology and security including blockchains, Internet of things (IoT) and cloud computing (Gudeme et al. 2020 ). The preponderance and ubiquity of human biometric information make it imperative to invest in securing such biometric data.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…IaaS cloud includes management such as the generation of computing resources to a certain extent in a network layer for a specific geographical area through fog computing [5]. Furthermore, a program interface similar to this which enables customizable computing instances also needs to be provided [6].…”
Section: Related Research 21 Smart Traffic Network Environment Modelmentioning
confidence: 99%
“…Identity privacy is preserved using a modification record table to record operation information. Different variations of signature algorithms, such as blind signature, random sampling, ID-based privacy, and attribute-based signature are used by multiple researchers during auditing [22]- [28]. Attribute-based signatures are based on attribute-based cryptography [16], [17].…”
Section: Introductionmentioning
confidence: 99%