2021
DOI: 10.1109/access.2021.3066497
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Identity-Based Public Integrity Auditing of Shared Data in Cloud Storage With User Privacy Preserving

Abstract: and Telecommunications), Ministry of Education ( project name: personalized music recommendation oriented by multimodal social network big data ).

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 31 publications
(31 citation statements)
references
References 41 publications
0
11
0
1
Order By: Relevance
“…|𝐺 1 |. Yan et al [102] also proposed an identity-based public auditing scheme with user privacy-preserving. This scheme ensures the relationship of data and data uploader in the proof generation phase instead of integrity auditing phase.…”
Section: ) Lightweight and Privacy_preserving Public Auditing Using Iomentioning
confidence: 99%
“…|𝐺 1 |. Yan et al [102] also proposed an identity-based public auditing scheme with user privacy-preserving. This scheme ensures the relationship of data and data uploader in the proof generation phase instead of integrity auditing phase.…”
Section: ) Lightweight and Privacy_preserving Public Auditing Using Iomentioning
confidence: 99%
“…A third party auditor can be used to audit data to ensure integrity, as can dynamic data integrity auditing as stated by the authors of [213] and [214]. A Provable Data Possession proposed by [215] can allow people to audit data efficiently by outsourcing data into small blocks of data and then blinding them so that each block can be individually verified.…”
Section: Privacy-preserving Integrity Checking and Auditingmentioning
confidence: 99%
“…To eliminate certificate management. Yan et al [23,24] proposed an identity-based public group data checking scheme with data owner privacy preserving. The scheme hides the identity of data owner in integrity proof so that TPA verifies the proof without knowing the owner of challenged data.…”
Section: Related Workmentioning
confidence: 99%
“…Blockchain technique provides a new idea to check the integrity of cloud-IoT data [23]. With the advantages of decentralized, traceable and immutable characteristics, blockchain satisfies the needs of cloud-IoT data integrity checking.…”
Section: Introductionmentioning
confidence: 99%