2016 Eighth International Conference on Advanced Computing (ICoAC) 2017
DOI: 10.1109/icoac.2017.7951745
|View full text |Cite
|
Sign up to set email alerts
|

Efficient privacy preserving integrity checking model for cloud data storage security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(20 citation statements)
references
References 14 publications
0
20
0
Order By: Relevance
“…The following are the studies that were used to create the set of privacy-preserving attributes. 6,[9][10][11][12][13][14]16,26,29, This article combines the most modern and well-known privacy attributes that are employed for Cloud data storage. These attributes are thought to represent the most recent discoveries of cyber security specialists in the sector.…”
Section: The Taxonomy Of Privacy-preserving Attributes For the Cloud ...mentioning
confidence: 99%
See 3 more Smart Citations
“…The following are the studies that were used to create the set of privacy-preserving attributes. 6,[9][10][11][12][13][14]16,26,29, This article combines the most modern and well-known privacy attributes that are employed for Cloud data storage. These attributes are thought to represent the most recent discoveries of cyber security specialists in the sector.…”
Section: The Taxonomy Of Privacy-preserving Attributes For the Cloud ...mentioning
confidence: 99%
“…The decryption method restores the original format (plain text) of the encrypted data. 12,13,44 Decryption algorithms are used in CC to obtain encrypted items from the Cloud repositories (Cloud storage) via requests from specified users. To obtain access to the required data, users must have the appropriate credentials and the decryption key.…”
Section: Data Auditing Approachesmentioning
confidence: 99%
See 2 more Smart Citations
“…Once the data or database is shifted from local systems to the cloud, CSP takes the charge and starts managing data [4]. The initial data owner does not have control over the data at this stage, which poses a major security concern.…”
Section: Introductionmentioning
confidence: 99%