Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage

W Shen, J Qin, J Yu, R Hao, J Hu - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With cloud storage services, users can remotely store their data to the cloud and realize the
data sharing with others. Remote data integrity auditing is proposed to guarantee the …

Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation

Y Zhang, C Xu, X Liang, H Li, Y Mu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Cloud storage services allow users to outsource their data to cloud servers to save local
data storage costs. However, unlike using local storage devices, users do not physically …

Enabling cloud storage auditing with verifiable outsourcing of key updates

J Yu, K Ren, C Wang - IEEE transactions on information …, 2016 - ieeexplore.ieee.org
Key-exposure resistance has always been an important issue for in-depth cyber defence in
many security applications. Recently, how to deal with the key exposure problem in the …

Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage

A Yang, J Xu, J Weng, J Zhou… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Cloud storage has been in widespread use nowadays, which alleviates users' burden of
local data storage. Meanwhile, how to ensure the security and integrity of the outsourced …

Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability

G Yang, J Yu, W Shen, Q Su, Z Fu, R Hao - Journal of Systems and …, 2016 - Elsevier
Nowadays, cloud storage service has been widely adopted by diverse organizations,
through which users can conveniently share data with others. For security consideration …

Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium

W Shen, J Yu, H **a, H Zhang, X Lu, R Hao - Journal of Network and …, 2017 - Elsevier
To verify the integrity of cloud data, many cloud storage auditing schemes have been
proposed. However, most of them incur a lot of computation overhead for users when data …

Data integrity auditing without private key storage for secure cloud storage

W Shen, J Qin, J Yu, R Hao, J Hu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Using cloud storage services, users can store their data in the cloud to avoid the expenditure
of local data storage and maintenance. To ensure the integrity of the data stored in the …

BOSSA: A decentralized system for proofs of data retrievability and replication

D Chen, H Yuan, S Hu, Q Wang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Proofs of retrievability and proofs of replication are two cryptographic tools that enable a
remote server to prove that the users' data has been correctly stored. Nevertheless, the …

Conditional anonymous certificateless public auditing scheme supporting data dynamics for cloud storage systems

X Zhang, X Wang, D Gu, J Xue… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Cloud computing provides users with convenient data storage services, which
simultaneously poses various security concerns, the integrity of outsourced data has been …

Anonymous aggregate fine-grained cloud data verification system for smart health

M Ali, MR Sadeghi, X Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the rapid development of cloud computing and Internet of Things (IoT), smart health (s-
health) is anticipated to enhance healthcare quality significantly. However, data integrity …