2017
DOI: 10.1002/cpe.4359
|View full text |Cite
|
Sign up to set email alerts
|

SeShare: Secure cloud data sharing based on blockchain and public auditing

Abstract: SummaryIn a data sharing group, each user can upload, modify, and access group files and a user is required to generate a new signature for the modified file after modification. There is a situation that two or more users modify the same file at almost the same time, which should be avoided as it gives rise to a signature conflict. However, the existing schemes do not take it into consideration. In this paper, we proposed a new mechanism SeShare for data storing based on blockchain to realize signature uniquen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 31 publications
(8 citation statements)
references
References 27 publications
0
8
0
Order By: Relevance
“…However, their scheme needs the data user to generate a challenge. Huang et al [27] utilized three different transactions to record data dynamics in blockchain. Some schemes utilized smart contracts to realize fair judgement recently.…”
Section: Blockchain-based Public Auditingmentioning
confidence: 99%
“…However, their scheme needs the data user to generate a challenge. Huang et al [27] utilized three different transactions to record data dynamics in blockchain. Some schemes utilized smart contracts to realize fair judgement recently.…”
Section: Blockchain-based Public Auditingmentioning
confidence: 99%
“…We assume that |Z q | = 160 bits, |G 1 | = 160 bits, the number of blocks in shared data is n = 1, 000, 000 and |n| = 20 bits. According to the previous work in SeShare [24] , to keep the detection probability greater than 99%, we set the number of challenged blocks in each auditing task as c = 460. Fig.2 and Fig.3 show the comparison of experimental results between our scheme and schemes CPV [3] and CPDP [15] .…”
Section: Table 4 Communication Cost Comparisonmentioning
confidence: 99%
“…In this type of protocol, TPAs assist the CA in data integrity checking. Generally, these protocols are designed based on pre‐defined TPAs, 6,7 public/random TPAs, 8,9 and SC 10,11 . However, the mentioned categories have advantages and disadvantages as below.…”
Section: Introductionmentioning
confidence: 99%