2015
DOI: 10.1109/tcc.2014.2366148
|View full text |Cite
|
Sign up to set email alerts
|

OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices

Abstract: UPCommonsPortal del coneixement obert de la UPC http://upcommons.upc.edu/e-prints Li, Jin [et al.] Abstract-Cloud Computing moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. In this work, we study the problem of ensuring the integrity of data storage in Cloud Computing. To reduce the computational cost at user side during the integrity verification of their data, the notion of public verifiability ha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 73 publications
(26 citation statements)
references
References 27 publications
0
26
0
Order By: Relevance
“…To relieve the user's computation burden of authenticator generation, Guan et al [27] constructed a data integrity auditing scheme using indistinguishability obfuscation technique, which reduces the overhead for generating data authenticators. Li et al [28] proposed a data integrity auditing scheme which contains a cloud storage server and a cloud audit server. In this scheme, the cloud audit server helps user to generate data authenticators before uploading data to the cloud storage server.…”
Section: A Related Workmentioning
confidence: 99%
“…To relieve the user's computation burden of authenticator generation, Guan et al [27] constructed a data integrity auditing scheme using indistinguishability obfuscation technique, which reduces the overhead for generating data authenticators. Li et al [28] proposed a data integrity auditing scheme which contains a cloud storage server and a cloud audit server. In this scheme, the cloud audit server helps user to generate data authenticators before uploading data to the cloud storage server.…”
Section: A Related Workmentioning
confidence: 99%
“…Article [9] provides an associate economical verification theme for guaranteeing remote information integrity in cloud storage. The projected theme is established secure against reset attacks within the reinforced security model whereas supporting economical public verifiability and dynamic information operations at the same time projected a dynamic version of the previous PDP theme.…”
Section: Public Auditing Of Resource-constrained Devicesmentioning
confidence: 99%
“…If each data access requester must obtain the decryption key from the data owner whose PHI is to be read, this method will restrict accessibility, because the data owner might be offline. In terms of data integrity, the auditability concept [12], [13], [18] is gradually maturing. Considering the large quantity of outsourced PHI and the limited resources of an individual patient, the data owner can delegate an independent Third Party Auditor (TPA) to perform data integrity verification periodically without maintaining a local copy of data files.…”
Section: Introductionmentioning
confidence: 99%
“…Considering the large quantity of outsourced PHI and the limited resources of an individual patient, the data owner can delegate an independent Third Party Auditor (TPA) to perform data integrity verification periodically without maintaining a local copy of data files. Some studies [11], [14], [15], [16], [17], [18] have investigated the confidentiality issue in cloud storage, whereas others have focused on data auditing [12], [13], [16]. However, most existing PHI systems [14], [15], [17], [18] are not suitable for lightweight IoT devices because of the heavy cost of cryptographic computation.…”
Section: Introductionmentioning
confidence: 99%