2019 IEEE International Conference on Web Services (ICWS) 2019
DOI: 10.1109/icws.2019.00044
|View full text |Cite
|
Sign up to set email alerts
|

Block Chain-Based Data Audit and Access Control Mechanism in Service Collaboration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 10 publications
0
13
0
Order By: Relevance
“…The provenance auditor verifies provenance data through information in the block. Wang et al [11] proposed a decentralized model to solve the single point of trust problem in the traditional data auditing service model by collective trust. The protocol allows users to trace the history of their data.…”
Section: Blockchain Based Work On Data Integritymentioning
confidence: 99%
See 4 more Smart Citations
“…The provenance auditor verifies provenance data through information in the block. Wang et al [11] proposed a decentralized model to solve the single point of trust problem in the traditional data auditing service model by collective trust. The protocol allows users to trace the history of their data.…”
Section: Blockchain Based Work On Data Integritymentioning
confidence: 99%
“…However, neither the attacker nor the malicious server knows the private key α , so it is impossible to forge a m * j that satisfies: 1 H m * j + α P = 1 H m j + α P (11) and the proof cannot be modified. If the attackers or malicious servers delete the data m j in the cloud storage server, similar to the analysis above, it is impossible to forge a valid m * j because the private key α is unknown.…”
Section: ) Securitymentioning
confidence: 99%
See 3 more Smart Citations