2017
DOI: 10.1016/j.comnet.2017.05.032
|View full text |Cite
|
Sign up to set email alerts
|

Practical integrity preservation for data streaming in cloud-assisted healthcare sensor systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…Xu et al 26 extended the original CAT with prefix tree, and presented a lightweight VDS protocol. Chen et al 27 introduced the notion of arithmetic Merkle tree to ensure the flexibility of the tree structure. Moreover, the idea of VDS has also been used to achieve the integrity of data stored on blockchain.…”
Section: Related Workmentioning
confidence: 99%
“…Xu et al 26 extended the original CAT with prefix tree, and presented a lightweight VDS protocol. Chen et al 27 introduced the notion of arithmetic Merkle tree to ensure the flexibility of the tree structure. Moreover, the idea of VDS has also been used to achieve the integrity of data stored on blockchain.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, Other works have expanded the functionality of the original VDS protocol, so as to fulfill the security requirements of several special applications scenarios. For example, Chen et al 15 proposed streaming data authentication structures based on homomorphic encryption 16 . In their scheme, the vast majority of the computation burden is transferred to the cloud server, and the client only needs to perform lightweight addition and multiplication operations.…”
Section: Introductionmentioning
confidence: 99%
“…The paper [1] describes how it applies to distributed web environment. There is an application for live video streaming in VANETs environment in [3].An integrity verification scheme for data streaming is proposed in [2] to solve the one-wayness problem of Merkle tree. There is an instance of perceptual hash for authentication in [4].…”
Section: Introductionmentioning
confidence: 99%