2020
DOI: 10.1016/j.jisa.2019.102427
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preserving integrity checking of shared dynamic cloud data with user revocation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…It contains six algorithms such as: VC.KeyGen, VC.Com, VC.Open, VC.Ver, VC.Update, VC.ProofUpdate. Thokcham and Saikia [26] used a vector commitment scheme along with ring signature to generate proof during public auditing of cloud storage. Jiang et al [27] proposed public auditing scheme for shared dynamic data with group user revocation using vector commitment and verifier-local revocation group signature.…”
Section: Vector Commitmentmentioning
confidence: 99%
See 2 more Smart Citations
“…It contains six algorithms such as: VC.KeyGen, VC.Com, VC.Open, VC.Ver, VC.Update, VC.ProofUpdate. Thokcham and Saikia [26] used a vector commitment scheme along with ring signature to generate proof during public auditing of cloud storage. Jiang et al [27] proposed public auditing scheme for shared dynamic data with group user revocation using vector commitment and verifier-local revocation group signature.…”
Section: Vector Commitmentmentioning
confidence: 99%
“…Auditing is based on identity-based cryptography. Thokcham and Saikia [26] proposed collusion resistant auditing using CDH based Ring Signature scheme. Collusion between revoked user and CS is avoided through data owner by regularly updating valid members list to CS and TPA after each user revocation.…”
Section: ) Collusion Resistant Public Auditing Using Iomentioning
confidence: 99%
See 1 more Smart Citation
“…ODPDP scheme not proposing any solution for identity privacy. We extend this scheme by using CDH based ring signature to achieve identity privacy proposed by Thokcham [34]. P 2 DPDP also uses RBMT of ODPDP which allows verification of multiple dynamic operations in batch mode compared to MHT in Zhang et al [36].…”
Section: A Related Workmentioning
confidence: 99%
“…The real-time scenario demands the cloud environment to be more realistic by providing support to dynamic operations that includes data insertion, updation and deletion [5][6][7][8][9][10][11]. However, most of the existing literature are based on static data and do not support dynamic operations.…”
Section: Introductionmentioning
confidence: 99%