2019
DOI: 10.1016/j.jnca.2018.12.004
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving public auditing for secure data storage in fog-to-cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
71
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 84 publications
(72 citation statements)
references
References 24 publications
1
71
0
Order By: Relevance
“…A group management system based on lazy-revocation was designed to produce effectual activities of a group that had to endure attacks of collusion when increasing computational costs considerably. The outcome demonstrated an effective achievement towards secure auditing [7].…”
Section: Related Workmentioning
confidence: 90%
See 1 more Smart Citation
“…A group management system based on lazy-revocation was designed to produce effectual activities of a group that had to endure attacks of collusion when increasing computational costs considerably. The outcome demonstrated an effective achievement towards secure auditing [7].…”
Section: Related Workmentioning
confidence: 90%
“…The user decrypts the data after downloading to access it. In symmetric keys, both cryptic keys are similar and it is dissimilar in unsymmetrical keys [7]. Even with cryptic keys, the data security is under threat with possible key leakage and cyber-attacks in a multi-user cloud environment [8].…”
Section: Introductionmentioning
confidence: 99%
“…Although, in past years, many auditing schemes are presented for traditional cloud storage [12], [22], [25], [26], [31], [33], including many private and public auditing schemes, all of them are not directly applicable to fog-to-cloud computing for two main reasons [23], [24]. The first one is that the data from IoT is generated by various devices and hence it is inadvisable for those users (or data owners) to first retrieve these data and generate corresponding authenticators before outsourcing.…”
Section: Introductionmentioning
confidence: 99%
“…Hence, it is urgent to develop new auditing techniques to ensure data's integrity for fog-to-cloud computing. In recent work of [23], Tian et al took the first step to this direction and try to fill this gap. In fact, they designed a privacy-preserving public auditing system based on bilinear mapping and the so-called tag-transforming strategy.…”
Section: Introductionmentioning
confidence: 99%
“…Just like the case of symmetrical Group key agreement, all members of the group are given a session key after negotiation. By employing the session key, the group members can encrypt or decrypt information on group interaction, meaning that receivers and senders use the same group key [13].…”
Section: Introductionmentioning
confidence: 99%