2018
DOI: 10.1109/tsc.2015.2481880
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Proofs of Retrievability for Coded Cloud Storage Systems

Abstract: Cloud storage allows users to store their data in a remote server to get rid of expensive local storage and management costs and then access data of interest anytime anywhere. A number of solutions have been proposed to tackle the verification of remote data integrity and retrievability in cloud storage systems. Most of existing schemes, however, do not support efficient data dynamics and/or suffer from security vulnerabilities when involving dynamic data operations. In this paper, we propose a dynamic proof o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
35
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 54 publications
(36 citation statements)
references
References 26 publications
0
35
0
1
Order By: Relevance
“…However, at the side of the cloud storage server (CSS), there still exist all kinds of internal and external threats against the storage security of outsourced data, such as Byzantine failures, the monetary reasons, and the hacker attacks [5,6]. So, it is well known that CSS would be considered as a malicious entity that might try to hide the accident when data loss occurs, or even deliberately delete client's data for saving storage cost.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…However, at the side of the cloud storage server (CSS), there still exist all kinds of internal and external threats against the storage security of outsourced data, such as Byzantine failures, the monetary reasons, and the hacker attacks [5,6]. So, it is well known that CSS would be considered as a malicious entity that might try to hide the accident when data loss occurs, or even deliberately delete client's data for saving storage cost.…”
Section: Introductionmentioning
confidence: 99%
“…However, given the fact that most mobile clients only have a limited capacity so that these clients are unlikely to keep online all the time to perform the frequent auditing, various public auditing schemes are proposed [5,6,[9][10][11] for auditing migration, which enables mobile client to free herself by moving the heavy auditing tasks to a third-party auditor (TPA). But existing public schemes rely on the hypothesis 2 Wireless Communications and Mobile Computing that TPA is trusted to complete the migrated auditing tasks, meaning that these schemes do not provide any security guarantee to resist a malicious TPA that might break the auditing protocols, which is exactly the potential risk that has not been covered by current public auditing schemes [12].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The above type of systems will not be appropriate for distributed storage environment administrations where clients can check the trustworthiness as often as possible, for example, consistently. Subsequently, scientists presented proof of the storage to check the uprightness without copying documents from cloud storage [5]. Besides, clients may likewise require a few element operations, for example, alteration, addition, and cancellation, to upgrade their documents, while keeping up the capacity PoS is proposed for such element updating.…”
Section: Introductionmentioning
confidence: 99%