Data integrity verification of the outsourced big data in the cloud environment: A survey
With the explosive growth of data and the rapid development of science technology, big data
analysis has attracted increasing attention. Due to the restrictive performance of traditional …
analysis has attracted increasing attention. Due to the restrictive performance of traditional …
[HTML][HTML] A review of Power System False data attack Detection Technology based on Big data
Z Chang, J Wu, H Liang, Y Wang, Y Wang, X **ong - Information, 2024 - mdpi.com
As power big data plays an increasingly important role in the operation, maintenance, and
management of power systems, complex and covert false data attacks pose a serious threat …
management of power systems, complex and covert false data attacks pose a serious threat …
Multicopy provable data possession scheme supporting data dynamics for cloud-based electronic medical record system
In the era of big data, there are several insuperable research challenges in establishing
Electronic Medical Record (EMR) for updating massive data with traditional methods. It is an …
Electronic Medical Record (EMR) for updating massive data with traditional methods. It is an …
ESDRA: An efficient and secure distributed remote attestation scheme for IoT swarms
An Internet of Things (IoT) system generally contains thousands of heterogeneous devices
which often operate in swarms-large, dynamic, and self-organizing networks. Remote …
which often operate in swarms-large, dynamic, and self-organizing networks. Remote …
RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection
Mobile devices furnish users with various services while on the move, but also raise public
concerns about trajectory privacy. Unfortunately, traditional privacy protection methods, such …
concerns about trajectory privacy. Unfortunately, traditional privacy protection methods, such …
[HTML][HTML] An improved multi-copy cloud data auditing scheme and its application
Z Tu, XA Wang, W Du, Z Wang, M Lv - Journal of King Saud University …, 2023 - Elsevier
The security of the data in the cloud server suffers great challenges, and how to ensure the
integrity of the outsourced data in the cloud servers is a problem that should be solved …
integrity of the outsourced data in the cloud servers is a problem that should be solved …
Towards usable cloud storage auditing
Cloud storage security has gained considerable research efforts with the wide adoption of
cloud computing. As a security mechanism, researchers have been investigating cloud …
cloud computing. As a security mechanism, researchers have been investigating cloud …
Blockchain assisted privacy-preserving public auditable model for cloud environment with efficient user revocation
Cloud storage offers users to manage their remote data more efficiently. However, it comes
with the threat of severe security concerns, ie, integrity. Public auditing models have been …
with the threat of severe security concerns, ie, integrity. Public auditing models have been …
ZSS signature-based audit message verification process for cloud data integrity
Online cloud data storage, a pillar of the IT industry, offers data owners a plethora of
attractive developments in highly sought-after online scalable storage services for them to …
attractive developments in highly sought-after online scalable storage services for them to …
Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability
Cloud computing provides outsourcing of computing services at a lower cost, making it a
popular choice for many businesses. In recent years, cloud data storage has gained …
popular choice for many businesses. In recent years, cloud data storage has gained …