2017
DOI: 10.1109/tifs.2016.2615853
|View full text |Cite
|
Sign up to set email alerts
|

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage

Abstract: Remote data integrity checking (RDIC) enables a data storage server, say a cloud server, to prove to a verifier that it is actually storing a data owner's data honestly. To date, a number of RDIC protocols have been proposed in the literature. However, most of the constructions suffer from the issue of requiring complex key management. That is, they rely on the expensive public key infrastructure (PKI), which might hinder the deployment of RDIC in practice. In this paper, we propose a new construction of ident… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
211
0
6

Year Published

2018
2018
2020
2020

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 412 publications
(236 citation statements)
references
References 42 publications
0
211
0
6
Order By: Relevance
“…In some settings, the data owner does not want to leak the identity to the cloud or does not want the partial information on the data is leaking to the third auditing party. In such cases, privacy preserving schemes can be used, such as, Wang et al proposed a privacy preserving cloud auditing scheme, 19 and later, Yu et al 23 proposed a privacy preserving cloud auditing scheme by using the zero knowledge technique, etc.…”
Section: Figure 1 Gpos In Iot Settingmentioning
confidence: 99%
“…In some settings, the data owner does not want to leak the identity to the cloud or does not want the partial information on the data is leaking to the third auditing party. In such cases, privacy preserving schemes can be used, such as, Wang et al proposed a privacy preserving cloud auditing scheme, 19 and later, Yu et al 23 proposed a privacy preserving cloud auditing scheme by using the zero knowledge technique, etc.…”
Section: Figure 1 Gpos In Iot Settingmentioning
confidence: 99%
“…This was found to increase the transparency of the data stored and assess the trust among the providers. 9 However, an increase in the volume of data has increased the complexity of the system for monitoring the integrity and security of the data that is stored in the cloud environment. 14 However, the cloud computing was seen to be interfaced with numerous challenges such as on-demand provisioning, entangled supply chains, system vulnerabilities, legal and regulatory landscape Besides, and third part assessment was found to be inefficient considering the static characteristics and validity periods.…”
Section: Ofmentioning
confidence: 99%
“…Further, cloud computing service providers were found to provide the storage services in consort with service-oriented applications such as service (IaaS), platform as a service (PaaS), and software as a service (SaaS) infrastructure. 9 The data on cloud being accessible from any location leads to the threat in privacy concerns of the users. 6 However, there are various security issues concerning the cloud computing in the reliability of the data stored on cloud.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…TPA is generally used for the data integrity verification in remote or cloud storage [14][15]. The file is separated into blocks, and whether it has been manipulated is verified by PDP (Provable Data Possession) and POR (Provable Data Possession) methods.…”
Section: Tpa (Third Party Auditor)mentioning
confidence: 99%