The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2014
DOI: 10.1016/j.eswa.2014.06.027
|View full text |Cite
|
Sign up to set email alerts
|

Improved security of a dynamic remote data possession checking protocol for cloud storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
9

Relationship

4
5

Authors

Journals

citations
Cited by 53 publications
(26 citation statements)
references
References 23 publications
0
24
0
Order By: Relevance
“…The cloud server provides the huge cyberspace for cloud users to upload data, store data, update data and download the data. Data privacy has become an important research issue in today's cloud storage service [5,12,15,17,[23][24][25]. Therefore, the data senders will encrypt sensitive data or records before uploading them to the cloud storage space, whereas, in fact, this encrypted data will become an unrecognized ciphertext and even the data senders or the authorize data receivers cannot recognize its content.…”
Section: Introductionmentioning
confidence: 99%
“…The cloud server provides the huge cyberspace for cloud users to upload data, store data, update data and download the data. Data privacy has become an important research issue in today's cloud storage service [5,12,15,17,[23][24][25]. Therefore, the data senders will encrypt sensitive data or records before uploading them to the cloud storage space, whereas, in fact, this encrypted data will become an unrecognized ciphertext and even the data senders or the authorize data receivers cannot recognize its content.…”
Section: Introductionmentioning
confidence: 99%
“…The concerns while designing the data integrity schemes because they are vulnerable to different attacks [44]- [46]. The possible attacks against the schemes are discussed as follows:…”
Section: ) Securitymentioning
confidence: 99%
“…The TPA is able to publicly audit the integrity of the shared data in the cloud for the group. The group is an entity consisting of users, who create data and share with each other [12]. Users in the group trust each other and are able to manage the group cooperatively.…”
Section: Integrity Auditing Of Shared Datawith Secure User Revocationmentioning
confidence: 99%
“…Nevertheless, in order to keep a good reputation, cloud service agency may purposefully hide data loss events. In cloud storage, data integrity and leakage are getting to be a major concern of cloud users [12].…”
Section: Introduction 11 Cloud Computingmentioning
confidence: 99%