2018 Eleventh International Conference on Contemporary Computing (IC3) 2018
DOI: 10.1109/ic3.2018.8530649
|View full text |Cite
|
Sign up to set email alerts
|

Integrity Checking Using Third Party Auditor in Cloud Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…He is given with a task of recovering a file tag, verifying the signature, and reporting in case of any invalidity. [15]. The authors S. More and S. Chaudhari have suggested a novel approach for protecting the confidentiality and integrity of data [16].…”
Section: Literature Reviewmentioning
confidence: 99%
“…He is given with a task of recovering a file tag, verifying the signature, and reporting in case of any invalidity. [15]. The authors S. More and S. Chaudhari have suggested a novel approach for protecting the confidentiality and integrity of data [16].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The direction of eliminating the role of the CTP or reducing the potential risks of its existence has become the core of several recent studies that concern cloud security issues. In [16], S. Chakraborty et al, (2018) proposed an approach to ensure the integrity of data stored on a remote cloud server with the assistance of a trusted third-party auditor (TTPA). TTPA has been proposed as an expert agent in the data auditing process.…”
Section: Literature Reviewsmentioning
confidence: 99%