2017
DOI: 10.1016/j.jnca.2017.02.005
|View full text |Cite
|
Sign up to set email alerts
|

RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 43 publications
(12 citation statements)
references
References 18 publications
0
10
0
Order By: Relevance
“…To address this issue, Zhang et al [18] presented an MHT-based cloud auditing scheme to realize the auditing for dynamic data in the cloud. Later, a modified MHT cloud auditing scheme [35] with each node containing two values were proposed, which reduces the computational complexity of finding leaf nodes. However, the MHT-based cloud auditing schemes still have some severe overhead problems.…”
Section: B Related Workmentioning
confidence: 99%
“…To address this issue, Zhang et al [18] presented an MHT-based cloud auditing scheme to realize the auditing for dynamic data in the cloud. Later, a modified MHT cloud auditing scheme [35] with each node containing two values were proposed, which reduces the computational complexity of finding leaf nodes. However, the MHT-based cloud auditing schemes still have some severe overhead problems.…”
Section: B Related Workmentioning
confidence: 99%
“…LBT adopts a multibranch path structure, and the depth of the LBT to be constructed decreases with the increasing of out-degree, thus reducing the auxiliary information in the process of data integrity checking, simplifying the process of data dynamic update, and reducing the calculation overhead between entities in the system. In 2017, Garg and Bawa [30] added indexes and timestamps to the MHT structure introduced in the scheme [13] and proposed a rist-MHT (relative indexed and time-staged Merkle hash tree) structure. Based on this structure, they proposed a PDP mode.…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, time stamp attribute gives the authenticator data freshness. However, although these algorithms based on MHT hash tree [13,27,30] avoid downloading all the data in the auditing process, the correct verification results can only prove that the cloud server stores the hash tree but not the uploaded data.…”
Section: Related Workmentioning
confidence: 99%
“…Many data integrity auditing schemes have been proposed to allow either the data owner or the Third Party Auditor (TPA) to check whether the data stored in the cloud is intact or not. These schemes focus on different aspects of data integrity auditing, such as data dynamic operation [3][4][5], the privacy protection of data and user identities [6][7][8], key exposure resilience [9][10][11], the simplification of certificate management [12,13] and privacy-preserving authenticators [14], etc. In the above data integrity auditing schemes, the user needs to generate authenticators for data blocks with his private key.…”
Section: Introductionmentioning
confidence: 99%