2020
DOI: 10.1109/access.2020.3009539
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Cloud Auditing for Multiple Users Scheme With Authorization and Traceability

Abstract: With the widespread application of cloud storage, users could obtain many conveniences such as low-price data remote storage and flexible data sharing. Considering cloud service provider (CSP) is not full-trusted, lots of cloud auditing schemes are proposed to ensure the shared data security and integrity. However, existing cloud auditing schemes have some security risks, such as user identity disclosure, denial of service attack and single-manager abuse of power. To solve the above issues, we use certificatel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 35 publications
0
11
0
Order By: Relevance
“…is can happen only when the Proof-Ver algorithm resulted in success for each of the instance t ∈ T, since we assume that the data auditor executed the Proof-Ver algorithm honestly for each of these instances. Hence, each of the instance t ∈ T must satisfy equation (20), i.e.,…”
Section: Security and Communication Networkmentioning
confidence: 99%
See 3 more Smart Citations
“…is can happen only when the Proof-Ver algorithm resulted in success for each of the instance t ∈ T, since we assume that the data auditor executed the Proof-Ver algorithm honestly for each of these instances. Hence, each of the instance t ∈ T must satisfy equation (20), i.e.,…”
Section: Security and Communication Networkmentioning
confidence: 99%
“…Since both proofs P 1u and P 2u are valid proofs, they must satisfy auditor verification equation (20):…”
Section: Analysis Calculate: μmentioning
confidence: 99%
See 2 more Smart Citations
“…Certificateless authentication [29], [30] is one of the cryptographic techniques for authentication. Some authors proposed privacy-preserving integrity verification scheme [31], [32] using certificate-less ring signature which greatly reduces the computation cost during auditing. Li et al [19] proposed integrity checking of group shared data using certificateless signature.…”
Section: Introductionmentioning
confidence: 99%