2015
DOI: 10.1109/tc.2014.2375190
|View full text |Cite
|
Sign up to set email alerts
|

MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
94
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 207 publications
(94 citation statements)
references
References 23 publications
0
94
0
Order By: Relevance
“…Since the emerging of cloud computing paradigm, and its data security and privacy has been studied extensively since its one of its main concerns [14], and since traditional technologies for checking data integrity are no longer applicable for environments with remote data [15], a lot of schemes has been proposed to enhance cloud security in terms of its data integrity. Ref.…”
Section: Related Workmentioning
confidence: 99%
“…Since the emerging of cloud computing paradigm, and its data security and privacy has been studied extensively since its one of its main concerns [14], and since traditional technologies for checking data integrity are no longer applicable for environments with remote data [15], a lot of schemes has been proposed to enhance cloud security in terms of its data integrity. Ref.…”
Section: Related Workmentioning
confidence: 99%
“…Another plan intended for secure confirmation with element burrowing is presented. Liu et al, (2015) discussed despite the fact that the plan just requires just a single authenticator for each square, it has two serious downsides. To begin with, since the confirmation procedure requires mystery material, there will be security issues while stretching.…”
Section: Literature Surveymentioning
confidence: 99%
“…Since the confirmation procedure requires mystery material, there will be security issues while stretching. [6] Praveena, A., & Sasikala, C. (2015) proposed a novel privacypreserving mechanism that maintenances public auditing on shared data stored in the cloud. It verifies and control the data integrity.…”
Section: Literature Surveymentioning
confidence: 99%
“…Ateniese et al proposed two concrete PDP constructions by making use of RSA-based homomorphic linear authenticators. Due to its necessity and practicability, remote data integrity checking has attracted extensive research interest [7]- [10], [12]- [15], [17]- [22], [26], [27] in recent years. Shacham and Waters [7] proposed the notion of compact proofs of retrievability by making use of publicly verifiable homomorphic authenticators from BLS signature [38].…”
Section: Introductionmentioning
confidence: 99%
“…Wang et al [15] improved the previous PDP models by manipulating the Merkle Hash Tree (MHT) for block tag authentication. A recent work due to Liu et al [26] showed that MHT itself is not enough to verify the block indices, which may lead to replace attack. They gave topdown levelled multi-replica MHT based data auditing scheme for dynamic big data storage on the cloud.…”
Section: Introductionmentioning
confidence: 99%