2021
DOI: 10.1155/2021/6639634
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage

Abstract: Cloud computing is a fast-growing technology which supplies scalable, innovative, and efficient business models. However, cloud computing is not fully trusted, and the security of the data outsourced in cloud storage needs to be guaranteed. One of the hottest issues is how to ensure the integrity of the data in cloud storage. Until now, many researchers have proposed lots of provable data possession (PDP) schemes to deal with the problem of data integrity audition. Nevertheless, very little effort has been dev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 43 publications
0
6
0
Order By: Relevance
“…Both integrity-proof generation and verification must also efficiently aggregate information of different group users. The schemes in [23], [24], [25], [26], [28], [30], [31], [32], [40], and [41] support shared group data auditing. While we primarily focus on CLC-based shared group data auditing schemes considering the benefits of CLC over PKI and IBC.…”
Section: B Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Both integrity-proof generation and verification must also efficiently aggregate information of different group users. The schemes in [23], [24], [25], [26], [28], [30], [31], [32], [40], and [41] support shared group data auditing. While we primarily focus on CLC-based shared group data auditing schemes considering the benefits of CLC over PKI and IBC.…”
Section: B Related Workmentioning
confidence: 99%
“…While we primarily focus on CLC-based shared group data auditing schemes considering the benefits of CLC over PKI and IBC. The CLC-based shared group data auditing schemes in [28], [30], [31], [32], and [40] are for conventional cloud computing scenarios. Hence, these schemes cannot be applied directly to shared group data auditing in fog computing scenarios, considering the distinctive properties of fog networks as mentioned below.…”
Section: B Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To handle user groups, most of the auditing schemes uses group and ring signature techniques that suffers from large tag size resulting in increased communication and verification cost as well as storage space. Yan et al [99] proposed certificateless PDP in a workgroup that preserves privacy with respect to data uploader as well as group user. This scheme experience reduction in verification time but cost of tag generation is linearly increasing with number of tags.…”
Section: ) Lightweight and Privacy_preserving Public Auditing Using Iomentioning
confidence: 99%
“…Ji et al introduced an improved version of [10] by increasing the flexibility and optimizing the efficiency [8]. Recently, many researchers proposed some PDP schemes to support data privacy [11,14,17,25].…”
Section: Related Workmentioning
confidence: 99%