Data integrity verification of the outsourced big data in the cloud environment: A survey

L Zhou, A Fu, S Yu, M Su, B Kuang - Journal of Network and Computer …, 2018 - Elsevier
With the explosive growth of data and the rapid development of science technology, big data
analysis has attracted increasing attention. Due to the restrictive performance of traditional …

[HTML][HTML] A review of Power System False data attack Detection Technology based on Big data

Z Chang, J Wu, H Liang, Y Wang, Y Wang, X **ong - Information, 2024 - mdpi.com
As power big data plays an increasingly important role in the operation, maintenance, and
management of power systems, complex and covert false data attacks pose a serious threat …

Multicopy provable data possession scheme supporting data dynamics for cloud-based electronic medical record system

L Zhou, A Fu, Y Mu, H Wang, S Yu, Y Sun - Information Sciences, 2021 - Elsevier
In the era of big data, there are several insuperable research challenges in establishing
Electronic Medical Record (EMR) for updating massive data with traditional methods. It is an …

ESDRA: An efficient and secure distributed remote attestation scheme for IoT swarms

B Kuang, A Fu, S Yu, G Yang, M Su… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
An Internet of Things (IoT) system generally contains thousands of heterogeneous devices
which often operate in swarms-large, dynamic, and self-organizing networks. Remote …

RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection

S Chen, A Fu, J Shen, S Yu, H Wang, H Sun - Journal of Network and …, 2020 - Elsevier
Mobile devices furnish users with various services while on the move, but also raise public
concerns about trajectory privacy. Unfortunately, traditional privacy protection methods, such …

[HTML][HTML] An improved multi-copy cloud data auditing scheme and its application

Z Tu, XA Wang, W Du, Z Wang, M Lv - Journal of King Saud University …, 2023 - Elsevier
The security of the data in the cloud server suffers great challenges, and how to ensure the
integrity of the outsourced data in the cloud servers is a problem that should be solved …

Towards usable cloud storage auditing

F Chen, F Meng, T **ang, H Dai, J Li… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cloud storage security has gained considerable research efforts with the wide adoption of
cloud computing. As a security mechanism, researchers have been investigating cloud …

Blockchain assisted privacy-preserving public auditable model for cloud environment with efficient user revocation

R Mishra, D Ramesh, DR Edla, MC Trivedi - Cluster Computing, 2022 - Springer
Cloud storage offers users to manage their remote data more efficiently. However, it comes
with the threat of severe security concerns, ie, integrity. Public auditing models have been …

ZSS signature-based audit message verification process for cloud data integrity

P Goswami, N Faujdar, S Debnath, AK Khan… - IEEE …, 2023 - ieeexplore.ieee.org
Online cloud data storage, a pillar of the IT industry, offers data owners a plethora of
attractive developments in highly sought-after online scalable storage services for them to …

Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability

P Goswami, N Faujdar, S Debnath, AK Khan… - Journal of Cloud …, 2024 - Springer
Cloud computing provides outsourcing of computing services at a lower cost, making it a
popular choice for many businesses. In recent years, cloud data storage has gained …