2020
DOI: 10.1049/cje.2020.05.007
|View full text |Cite
|
Sign up to set email alerts
|

Certificateless Public Verification for Data Storage and Sharing in the Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…ECC-based secure cloud framework with logging mechanism is to provide a highlevel design of the SSL VPN and secure cloud mobile banking. It helps secure data transfer for the users [8][9][10]. Software applications and web services are used with secure log files maintained.…”
Section: Design Of Secured Cloud Storage Mechanismmentioning
confidence: 99%
“…ECC-based secure cloud framework with logging mechanism is to provide a highlevel design of the SSL VPN and secure cloud mobile banking. It helps secure data transfer for the users [8][9][10]. Software applications and web services are used with secure log files maintained.…”
Section: Design Of Secured Cloud Storage Mechanismmentioning
confidence: 99%
“…It will also be done quickly if the capacity is reduced. It just stopped the vendor's cloud service [7] . The use of Amazon S3 for elastic storage by Stanford University and the University of Texas is a strategic development in computing environments.…”
Section: Elastic Cloud Storagementioning
confidence: 99%
“…In 2019, Yang et al [28] constructed a data integrity batch auditing protocol that can work in multi-cloud storage. In 2020, Huang et al [29] applied the CLC to RDIBA and proposed a certificateless remote data integrity batch auditing protocol. However, most of the above protocols are not resistant to collusion attacks let alone the fully chosen-key attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Before analyzing the performance of our CBRDIBA protocol, we first compared our CBRDIBA protocol with several data integrity auditing protocols [13,16,25,[27][28][29] in Table 2, and we notice that the CBRDIBA protocol supports batch auditing, resisting collusion attacks, anonymity, Lucas error search, with no key escrow problem, and with no secure channels simultaneously. e protocol uses Lucas search to deal with batch auditing failures, which is a more efficient error search method than binary search.…”
Section: Performance Evaluationmentioning
confidence: 99%