2018
DOI: 10.1007/s00500-018-3435-z
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and secure big data storage system with leakage resilience in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 30 publications
(12 citation statements)
references
References 53 publications
0
12
0
Order By: Relevance
“…The amount of leakage of private key is limited between two consecutive private key updates, while the whole leakage amount may be arbitrary large. Zhang et al [116] presented a continuous leakage-resilient identity-based encryption scheme (CLR-IBE) to protect data security from partial secret key leakage in the continuous leakage model. It is a big data storage system in cloud computing.…”
Section: Leakage-resilientmentioning
confidence: 99%
See 2 more Smart Citations
“…The amount of leakage of private key is limited between two consecutive private key updates, while the whole leakage amount may be arbitrary large. Zhang et al [116] presented a continuous leakage-resilient identity-based encryption scheme (CLR-IBE) to protect data security from partial secret key leakage in the continuous leakage model. It is a big data storage system in cloud computing.…”
Section: Leakage-resilientmentioning
confidence: 99%
“…As long as the key is updated regularly and the key secret information is not leaked in the process, the continuous leakage elasticity can be obtained. This scheme has the same leakage ratio to [116].…”
Section: Leakage-resilientmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent years, cloud computing has developed rapidly with its advantages of ultra-large-scale storage, powerful computing power, high scalability, and low cost [ 1 ]. Any company or individual can access cloud computing servers through a payment mode [ 2 , 3 , 4 , 5 , 6 ]. At the same time, with the advancement of computer technology and the development of big data, artificial intelligence, and the Internet of Things (IoT), the demand for data interaction analysis for mass terminals has rapidly increased [ 7 , 8 , 9 ].…”
Section: Introductionmentioning
confidence: 99%
“…We know that cloud storage technology is the most common and most popular cloud computing service today. The extensive application of cloud storage motivates enterprises and organizations to outsource data storage to third-party cloud providers [12][13][14][15][16]. Zhang et al [17] proposed a fine-grained access control system suitable for resource-constrained users in cloud computing.…”
Section: Introductionmentioning
confidence: 99%