From security to assurance in the cloud: A survey
The cloud computing paradigm has become a mainstream solution for the deployment of
business processes and applications. In the public cloud vision, infrastructure, platform, and …
business processes and applications. In the public cloud vision, infrastructure, platform, and …
Data integrity verification of the outsourced big data in the cloud environment: A survey
With the explosive growth of data and the rapid development of science technology, big data
analysis has attracted increasing attention. Due to the restrictive performance of traditional …
analysis has attracted increasing attention. Due to the restrictive performance of traditional …
Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage
Remote data integrity checking (RDIC) enables a data storage server, say a cloud server, to
prove to a verifier that it is actually storing a data owner's data honestly. To date, a number of …
prove to a verifier that it is actually storing a data owner's data honestly. To date, a number of …
An efficient public auditing protocol with novel dynamic structure for cloud data
With the rapid development of cloud computing, cloud storage has been accepted by an
increasing number of organizations and individuals, therein serving as a convenient and on …
increasing number of organizations and individuals, therein serving as a convenient and on …
Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems
Remote data integrity checking is of great importance to the security of cloud-based
information systems. Previous works generally assume a trusted third party to oversee the …
information systems. Previous works generally assume a trusted third party to oversee the …
Fuzzy identity-based data integrity auditing for reliable cloud storage systems
Data integrity, a core security issue in reliable cloud storage, has received much attention.
Data auditing protocols enable a verifier to efficiently check the integrity of the outsourced …
Data auditing protocols enable a verifier to efficiently check the integrity of the outsourced …
Enabling efficient user revocation in identity-based cloud storage auditing for shared big data
Cloud storage auditing schemes for shared data refer to checking the integrity of cloud data
shared by a group of users. User revocation is commonly supported in such schemes, as …
shared by a group of users. User revocation is commonly supported in such schemes, as …
Panda: Public auditing for shared data with efficient user revocation in the cloud
With data storage and sharing services in the cloud, users can easily modify and share data
as a group. To ensure shared data integrity can be verified publicly, users in the group need …
as a group. To ensure shared data integrity can be verified publicly, users in the group need …
Dynamic-hash-table based public auditing for secure cloud storage
Cloud storage is an increasingly popular application of cloud computing, which can provide
on-demand outsourcing data services for both organizations and individuals. However …
on-demand outsourcing data services for both organizations and individuals. However …
Identity-based distributed provable data possession in multicloud storage
Remote data integrity checking is of crucial importance in cloud storage. It can make the
clients verify whether their outsourced data is kept intact without downloading the whole …
clients verify whether their outsourced data is kept intact without downloading the whole …