2012
DOI: 10.1007/978-3-642-34601-9_23
|View full text |Cite
|
Sign up to set email alerts
|

Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…Here, the trust assessment strategy is proposed in which the weighted trust factor is determined thinking about various properties. The trust factor encourages clients to distinguish reliable cloud specialist co-ops through which they can utilize cloud administrations [22,23]. This work incorporates information to the executives in cloud servers with security and protection [24].…”
Section: Literature Surveymentioning
confidence: 99%
“…Here, the trust assessment strategy is proposed in which the weighted trust factor is determined thinking about various properties. The trust factor encourages clients to distinguish reliable cloud specialist co-ops through which they can utilize cloud administrations [22,23]. This work incorporates information to the executives in cloud servers with security and protection [24].…”
Section: Literature Surveymentioning
confidence: 99%
“…However, the PDP scheme incurs high computation and communication cost on the server side due to the usage of RSA numbering over the whole file. It also has linear storage for the user and fails to provide secure data possession when the server has a malicious intent [ 23 , 24 ]. In [ 16 ], Ateniese et al considered static data update issue in the original PDP method [ 15 ] and developed a semidynamic data auditing method based on symmetric-key operations.…”
Section: Related Workmentioning
confidence: 99%
“…The proof procedure is based on polynomial commitment and uses evaluation in the exponential instead of bilinear maps. This idea has also been adopted by [18], based on Lagrangian interpolation.…”
Section: B Related Workmentioning
confidence: 99%
“…Recently, to mitigate these concerns, many efforts have been proposed under different systems and security models [2]- [4], [10], [17], [18], [23]. These schemes are called Provable Data Possession PDP schemes.…”
mentioning
confidence: 99%