2021
DOI: 10.1109/tdsc.2019.2925800
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Group-Oriented Provable Data Possession in the Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(16 citation statements)
references
References 35 publications
0
16
0
Order By: Relevance
“…Sookhak et al [9] investigated the realization of data dynamics with the aid of a novel structure -divide and conquer tables. With the help of the authenticated structure named blockless Merkle tree, He et al [10] proposed a dynamic group-oriented PDP scheme which can realize full dynamics. Considering that the traditional scheme is only applicable to audits where there is no dispute over data possession, combined with blockchain technology, Xu et al [11] provided a fairly arbitrable data auditing protocol.…”
Section: Related Workmentioning
confidence: 99%
“…Sookhak et al [9] investigated the realization of data dynamics with the aid of a novel structure -divide and conquer tables. With the help of the authenticated structure named blockless Merkle tree, He et al [10] proposed a dynamic group-oriented PDP scheme which can realize full dynamics. Considering that the traditional scheme is only applicable to audits where there is no dispute over data possession, combined with blockchain technology, Xu et al [11] provided a fairly arbitrable data auditing protocol.…”
Section: Related Workmentioning
confidence: 99%
“…In order to guarantee the integrity of data stored in the cloud, a number of cloud storage auditing schemes [2], [13], [15], [19], [22], [23], [32], [38] were proposed. Ateniese et al [2] firstly proposed a notion of ''Provable Data Possession'' (PDP) and designed a publicly verifiable PDP scheme by utilizing homomorphic authenticators and random sample technique.…”
Section: ) Cloud Storage Auditingmentioning
confidence: 99%
“…A good number of RDIC protocols have also been proposed by the researchers for auditing group shared data [10, 13-25, 32, 35-37, 39]. Some of these schemes, such as [10,42], are dependent on the traditional public key infrastructure (PKI)-based system where a trusted certification authority (CA) is responsible for managing and distributing public key certificates of all the users and the certificate revocation lists (CRLs). Although PKI-based security protocols serve excellent in traditional networks such as the Internet, they are inefficient in a ubiquitous network like FOG-CPS.…”
Section: Introductionmentioning
confidence: 99%