A survey on proof of retrievability for cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and future trends

CB Tan, MHA Hijazi, Y Lim, A Gani - Journal of Network and Computer …, 2018 - Elsevier
Cloud storage has emerged as the latest trend for data storage over the traditional storage
method which consume more storage spaces of data owner resources for backup and …

Blockchain-based dynamic provable data possession for smart cities

R Chen, Y Li, Y Yu, H Li, X Chen… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Smart cities have experienced rapid development with the advances of information and
communication technologies such as Internet of Things (IoT). To tackle the data storage …

Generic dynamic data outsourcing framework for integrity verification

M Etemad, A Küpçü - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Ateniese et al. proposed the Provable Data Possession (PDP) model in 2007. Following
that, Erway et al. adapted the model for dynamically updatable data and called it the …

RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing

N Garg, S Bawa - Journal of Network and Computer Applications, 2017 - Elsevier
Cloud computing is a recent phrase in marketing for a concept which has been known for
years: Outsourcing. Cloud computing provides cornucopian of gratuities for both individual …

DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems

A Fu, Y Li, S Yu, Y Yu, G Zhang - Journal of Network and Computer …, 2018 - Elsevier
As cloud storage has become more and more ubiquitous, there are a large number of
consumers renting cloud storage services. However, as users lose direct control over the …

A lightweight identity-based provable data possession supporting users' identity privacy and traceability

R Rabaninejad, MA Attari, MR Asaar… - Journal of Information …, 2020 - Elsevier
Cloud storage auditing is considered as a significant service used to verify the integrity of
data stored in public cloud. However, most existing auditing protocols suffer form complex …

Public integrity auditing of shared encrypted data within cloud storage group

C Han, L Wang - Wireless communications and mobile …, 2022 - Wiley Online Library
The pandemic of COVID‐19 has posed a severe challenge to the traditional on‐site
centralized development projects; people therefore have to share data in a group by the …

Security and privacy issues of fog computing

HJ Nam, HY Choi, HJ Shin, HS Kwon… - The Journal of …, 2017 - koreascience.kr
With the development of IoT (Internet of Things) technology, the application area has been
diversified and the number of users using this service also has increased greatly. Real time …

Effects of Competition and Reputation on Auditing Cloud Service Provider's Security Commitment

S Wu, L Song - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
Auditing a cloud service provider's (CSP's) compliance with data backup requirements is of
great value to data availability and redundancy. As the checking incurs extra costs, a lot of …

[PDF][PDF] Basgit: A secure digital epassport alternative

C Kocaogullar, K Yıldırım, MA Sakaogulları, A Küpçü - ISCTURKEY, 2021 - crypto.ku.edu.tr
This paper discusses a new passport program that allows the passports to be printed on
paper or carried in a smartphone application by the passport holders, without any …