2022
DOI: 10.1016/j.cose.2022.102858
|View full text |Cite
|
Sign up to set email alerts
|

ID-based sanitizable signature data integrity auditing scheme with privacy-preserving

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…Public key cryptography techniques are highly employed in designing and developing public data auditing schemes [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [14], [16], [17], [23], [24], [25], [28], [30], [31], [40]. The metadata generation, a core component of a data auditing scheme, employs user private keys.…”
Section: B Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Public key cryptography techniques are highly employed in designing and developing public data auditing schemes [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [14], [16], [17], [23], [24], [25], [28], [30], [31], [40]. The metadata generation, a core component of a data auditing scheme, employs user private keys.…”
Section: B Related Workmentioning
confidence: 99%
“…While the user trusts and assumes the confidentiality of data files at the cloud server, there is still concern about remote data file integrity. Numerous schemes in the literature [2], [3], [4], [5], [7], [9], [10], [11], [12], [14], [15], [16], [17], [18], [19], [23], [24], [25], [26], [28], [29], [30], [31], [32], [40], [41], [42] provide remote data integrity checking (RDIC) mechanisms that allow the user to verify the integrity of the remote data file. An RDIC scheme contains two main components: The first is called the preprocessing component, and the second is called the auditing component.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Once the data is uploaded to the cloud, the data 10.3389/fenrg.2022.1058125 owner will lose the physical control of the smart grid data stored in the cloud and cannot directly determine whether the data is intact or not. In order to ensure the integrity of cloud data, plenty of public auditing schemes are proposed (Ji et al, 2022;Li et al, 2021;Zhou et al, 2021;Liu et al, 2022). In public auditing, the data owner can delegate the data integrity auditing tasks to a Third Party Auditor (TPA) with abundant computation resources.…”
Section: Introductionmentioning
confidence: 99%
“…In the area of data integrity verification, Liu [2] et al proposed a sanitizable signature data integrity verification technique. This technique uses the idea of sanitizability to sanitize data, protect privacy and generate signatures to verify the integrity of data.…”
Section: Introductionmentioning
confidence: 99%