2016
DOI: 10.1016/j.jss.2015.11.044
|View full text |Cite
|
Sign up to set email alerts
|

Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
53
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 125 publications
(53 citation statements)
references
References 17 publications
0
53
0
Order By: Relevance
“…The method used in the research [16] has considerable performance in cloud auditing. The public auditing method proposed in the research [17], preserved the privacy and identifying group member simultaneously. This method has a notable performance in the cloud auditing method for data privacy.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The method used in the research [16] has considerable performance in cloud auditing. The public auditing method proposed in the research [17], preserved the privacy and identifying group member simultaneously. This method has a notable performance in the cloud auditing method for data privacy.…”
Section: Resultsmentioning
confidence: 99%
“…The key generation technique of W. Shen [16] and G. Yang [17] are shown in this section. As the proposed method uses the Diffie-Hellman method to generate the key pairs.…”
Section: Key Generation Techniques Of Existing Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…IDM maintains the integrity of identities all over its life cycle to make related information updated and authenticated thus making it available for various services in a secure and protected manner [9,13,14]. IDMs can use one identification information for various organizations to access all different services within a trusted group of organizations across geographical borders.…”
Section: Figure 1 Life Cycle Of Idmmentioning
confidence: 99%
“…In the Yang et Al in [10] proposed scheme, each and every group contains the group members and the group manager, maintained by the area manager. Many unauthorized users may modify the data stored in cloud without any identity.…”
Section: Comparison Of Auditing Techniquesmentioning
confidence: 99%