2018
DOI: 10.1016/j.procs.2017.12.090
|View full text |Cite
|
Sign up to set email alerts
|

Public integrity auditing for shared dynamic cloud data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(13 citation statements)
references
References 18 publications
0
13
0
Order By: Relevance
“…From Table , we know that our scheme is the only one to accomplish forward security and be proved secure in the standard model. As for the computational cost of authentication tag generation and auditing verification, our scheme has a few advantages over scheme of Wang et al and scheme of Singh et al In terms of communication overhead, our scheme has a small advantages over scheme of Wang et al, while our scheme can support data privacy and forward security in the standard model. To the best of our knowledge, it is the first one that achieves full security, data privacy, and forward security.…”
Section: Performance Evaluationmentioning
confidence: 97%
See 2 more Smart Citations
“…From Table , we know that our scheme is the only one to accomplish forward security and be proved secure in the standard model. As for the computational cost of authentication tag generation and auditing verification, our scheme has a few advantages over scheme of Wang et al and scheme of Singh et al In terms of communication overhead, our scheme has a small advantages over scheme of Wang et al, while our scheme can support data privacy and forward security in the standard model. To the best of our knowledge, it is the first one that achieves full security, data privacy, and forward security.…”
Section: Performance Evaluationmentioning
confidence: 97%
“…From theoretical analysis, we give the comparison of overall performance for our construction with scheme of Wang et al and scheme of Singh et al in Table , where scheme of Wang et al is a state‐of‐the‐art privacy‐preserving public auditing scheme based on ring signature. From Table , we know that our scheme is the only one to accomplish forward security and be proved secure in the standard model.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…Future applications of big data and related technologies must maintain the three security goals of confidentiality, integrity, and availability (CIA) [2,3]. Singh and Thokchom [17], as well as Gupta and Shanker [7] have emphasized the importance and role of CIA triad on boosting security of big data and increasing acceptance of big data applications. The researchers discussed some of the commonly used encryption technologies and presented a discourse for a security future.…”
Section: Motivation and Scopementioning
confidence: 99%
“…It is a possibility that sometimes, the cloud service providers may discard or alter the data without saving in the storage space or keeping backups or replicas. It is also possible that cloud service providers may hide any accidental data loss and claim that the clients' data are still stored in the cloud storage [11][12][13][14]. As a result, data integrity verification at untrusted servers remains as one of the biggest concerns with cloud data storage [15].…”
Section: Introductionmentioning
confidence: 99%