2022
DOI: 10.3390/app12178602
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Storage Data Verification Using Signcryption Scheme

Abstract: Cloud computing brings convenience to the users by providing computational resources and services. However, it comes with security challenges, such as unreliable cloud service providers that could threaten users’ data integrity. Therefore, we need a data verification protocol to ensure users’ data remains intact in the cloud storage. The data verification protocol has three important properties: public verifiability, privacy preservation, and blockless verification. Unfortunately, various existing signcryption… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(26 citation statements)
references
References 21 publications
0
13
0
Order By: Relevance
“…They build a fair challenge message using Bitcoin to deter malevolent auditors from working with cloud servers. The author of this research paper [21] presented an enhanced the kind of a signcryption method based upon the short signature ZSS that may fulfill the aforementioned key data verification criteria. This proposed approach can provide more features for the same computational cost as another ZSS signcryption scheme.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…They build a fair challenge message using Bitcoin to deter malevolent auditors from working with cloud servers. The author of this research paper [21] presented an enhanced the kind of a signcryption method based upon the short signature ZSS that may fulfill the aforementioned key data verification criteria. This proposed approach can provide more features for the same computational cost as another ZSS signcryption scheme.…”
Section: Related Workmentioning
confidence: 99%
“…In papers [4,7,8,11,21,22], cloud user have the responsibility to prepare signature for all blocks. For all the above-mentioned research papers, a file F is broken up into n no.…”
Section: Computational Overheadmentioning
confidence: 99%
See 3 more Smart Citations