2020
DOI: 10.1109/access.2020.2991033
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Public Cloud Audit Scheme Supporting Dynamic Data for Unmanned Aerial Vehicles

Abstract: As one of the most popular applications in recent years, cloud storage has been gradually integrated into all walks of life. In the field of communication techniques for the unmanned aerial vehicles (UAVs), UAVs use sensors to upload collected data to cloud servers during various exploration activities, but UAVs can only store and calculate valid information currently collected due to the limited storage and computing performance. In the actual exploration, UAVs need not only to upload complete data to the clo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 33 publications
(36 reference statements)
0
10
0
Order By: Relevance
“…If the CSP forges the cloud data and tags, it could still pass the verification. Liu et al [29] proposed a public cloud audit scheme that supports dynamic data and privacy protection. However, in this scheme, the data owner first encrypts the data, and then the verifier calculates the digital signature, reducing the security and flexibility of the scheme.…”
Section: B Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…If the CSP forges the cloud data and tags, it could still pass the verification. Liu et al [29] proposed a public cloud audit scheme that supports dynamic data and privacy protection. However, in this scheme, the data owner first encrypts the data, and then the verifier calculates the digital signature, reducing the security and flexibility of the scheme.…”
Section: B Related Workmentioning
confidence: 99%
“…However, other schemes in Table 1 use public verification that any verifier can perform checking tasks. In terms of privacy protection, schemes in [22], [23], [27] and [30] combines homomorphic verification with random mask, and scheme in [29] encrypts and then signs the data block, all of which ensure that the verifier knows nothing about the data content during the data integrity checking. However, other schemes in Table 1 do not consider that computing the linear combination of data blocks in the data integrity proof may deduce the data content.…”
Section: B Related Workmentioning
confidence: 99%
“…As a real world example, unmanned aerial vehicles require an audit scheme to accommodate their limited storage and computing performance. They can use an audit scheme such as the one in [302] using a distributed string equality check and Merkle-hash tree multi-level index structure.…”
Section: Privacy-preservingmentioning
confidence: 99%
“…A data integrity scheme for cloud computing environment is presented on the basis of distributed machine learning in [16]. Initially, a Provable Data Possession (PDP) sampling based auditing algorithm is presented for verifying the data integrity.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This work supports dynamic operations on data as well and the security analysis of the work is performed. In [16], a privacypreserving audit scheme is proposed for cloud computing, which also can support dynamic data operations of Unmanned Aerial Vehicles (UAV). This technique works on the basis of distributed string equality check protocol in addition to Merkle hash tree.…”
Section: Literature Reviewmentioning
confidence: 99%