2019
DOI: 10.1109/access.2019.2915576
|View full text |Cite
|
Sign up to set email alerts
|

Secure Cloud Storage Service Using Bloom Filters for the Internet of Things

Abstract: Today, the Internet of Things (IoT) is used for convenience in everyday life in many areas. Owing to the fact that the data collected from the IoT are generated in large quantities, cloud computing is inevitably used to store and analyze the data. However, cloud storage is not owned by the user, so it is unreliable. Verifying the integrity of data collected in an IoT environment and stored in a cloud has two problems: a large amount of data needs to be verified, and the data verification should be done directl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 27 publications
0
8
0
Order By: Relevance
“…Using a BF, the authors (Jeong et al, 2019) proposed a secure storage service for IoT environments based on a provable data possession model. Their proposed scheme is not based on a public key, such as Rivest-Shamir-Adleman (RSA), bilinear mapping, and homomorphism.…”
Section: Using Filters In Iot Applicationsmentioning
confidence: 99%
“…Using a BF, the authors (Jeong et al, 2019) proposed a secure storage service for IoT environments based on a provable data possession model. Their proposed scheme is not based on a public key, such as Rivest-Shamir-Adleman (RSA), bilinear mapping, and homomorphism.…”
Section: Using Filters In Iot Applicationsmentioning
confidence: 99%
“…J. Jeong, J. W. J. Joo, Y. Lee and Y. Son, [14] "Secure Cloud Storage Service Using Bloom Filters for the Internet of Things," in the article identify the need for data integrity verification which is usually done by third party. The authors proposed a provable data possession model using Bloom Filter.…”
Section: Literature Surveymentioning
confidence: 99%
“…Jeong et al [ 9 ] presented an effective data possession verification scheme based on the use of the Bloom Filter (BF) [ 57 ]. The developed schema imposes a consistency guarantee on large volumes of data generated by low computational devices (Internet of Things) and stored in cloud services.…”
Section: Related Workmentioning
confidence: 99%
“…The monitoring of the integrity of files stored in the cloud has been the subject of several studies [ 5 , 6 , 7 , 8 , 9 ], which adopted different mechanisms and technologies. Pinheiro et al [ 10 ] presented a protocol designed for the periodic monitoring of the integrity of large stored files based on computational trust and symmetric cryptography.…”
Section: Introductionmentioning
confidence: 99%