2020
DOI: 10.1007/s10586-020-03193-0
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 43 publications
0
8
0
Order By: Relevance
“…Apart from that, the so en is used by the auditor for decrypting the random numbers (ur 1 , ur 2 , • • • ur x ) and recovering the x− number of sectors from fl id and the file name ( fl name ) . Then, the auditor has the ability to check the outsourced block integrity as given in Equation (6).…”
Section: Verification Stagementioning
confidence: 99%
See 1 more Smart Citation
“…Apart from that, the so en is used by the auditor for decrypting the random numbers (ur 1 , ur 2 , • • • ur x ) and recovering the x− number of sectors from fl id and the file name ( fl name ) . Then, the auditor has the ability to check the outsourced block integrity as given in Equation (6).…”
Section: Verification Stagementioning
confidence: 99%
“…It is ensured by verifying the integrity of data using efficient data storage auditing protocols. 6 The auditing protocol must have essential properties like (1) batch auditing-it should have the ability to support this auditing services for various clouds and several owners, (2) dynamic auditing-it should manage the dynamic updates of data, and (3) confidentiality-it must preserve data confidentiality of owners against the auditor. Thus, auditing protocol can withstand various data users and several clouds to give protection to the data.…”
Section: Introductionmentioning
confidence: 99%
“…Gary et al 19 design a protocol in order to reduce the computation complexity of client in setup phase, which is efficient in client. In 2020, Mishra et al 20 consider the homomorphic verifiable authenticator (HVA) bases on aggregate signature scheme and propose a public auditing protocol, which supports batch auditing and batch dynamic operations. In 2022, Yang et al 21 design a number‐rank‐based Merkle hash tree (NR‐MHT), which can support data dynamic operations.…”
Section: Introductionmentioning
confidence: 99%
“…To be exact, the fairness of the verification makes both parties questionable. To handle this, it is necessary to conduct public verification 1–37 …”
Section: Introductionmentioning
confidence: 99%
“…Guo et al 28 also proposed a lightweight privacy‐preserving and batch auditing scheme. By constructing the binary binomial tree 29 and dynamic larger branching tree, 30 Mishra et al provided two comprehensive public auditing schemes respectively. Combing the asymmetric authentication with variant 3 of ECDSA (elliptic curve digital signature algorithm) to the PDP, Jayaraman and Panneerselvam 31 proposed a privacy‐preserving public auditing scheme.…”
Section: Introductionmentioning
confidence: 99%