A survey on proof of retrievability for cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and future trends
Cloud storage has emerged as the latest trend for data storage over the traditional storage
method which consume more storage spaces of data owner resources for backup and …
method which consume more storage spaces of data owner resources for backup and …
Blockchain-based dynamic provable data possession for smart cities
Smart cities have experienced rapid development with the advances of information and
communication technologies such as Internet of Things (IoT). To tackle the data storage …
communication technologies such as Internet of Things (IoT). To tackle the data storage …
Generic dynamic data outsourcing framework for integrity verification
Ateniese et al. proposed the Provable Data Possession (PDP) model in 2007. Following
that, Erway et al. adapted the model for dynamically updatable data and called it the …
that, Erway et al. adapted the model for dynamically updatable data and called it the …
RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing
Cloud computing is a recent phrase in marketing for a concept which has been known for
years: Outsourcing. Cloud computing provides cornucopian of gratuities for both individual …
years: Outsourcing. Cloud computing provides cornucopian of gratuities for both individual …
DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems
As cloud storage has become more and more ubiquitous, there are a large number of
consumers renting cloud storage services. However, as users lose direct control over the …
consumers renting cloud storage services. However, as users lose direct control over the …
A lightweight identity-based provable data possession supporting users' identity privacy and traceability
Cloud storage auditing is considered as a significant service used to verify the integrity of
data stored in public cloud. However, most existing auditing protocols suffer form complex …
data stored in public cloud. However, most existing auditing protocols suffer form complex …
Public integrity auditing of shared encrypted data within cloud storage group
C Han, L Wang - Wireless communications and mobile …, 2022 - Wiley Online Library
The pandemic of COVID‐19 has posed a severe challenge to the traditional on‐site
centralized development projects; people therefore have to share data in a group by the …
centralized development projects; people therefore have to share data in a group by the …
Security and privacy issues of fog computing
With the development of IoT (Internet of Things) technology, the application area has been
diversified and the number of users using this service also has increased greatly. Real time …
diversified and the number of users using this service also has increased greatly. Real time …
Effects of Competition and Reputation on Auditing Cloud Service Provider's Security Commitment
S Wu, L Song - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
Auditing a cloud service provider's (CSP's) compliance with data backup requirements is of
great value to data availability and redundancy. As the checking incurs extra costs, a lot of …
great value to data availability and redundancy. As the checking incurs extra costs, a lot of …
[PDF][PDF] Basgit: A secure digital epassport alternative
C Kocaogullar, K Yıldırım, MA Sakaogulları, A Küpçü - ISCTURKEY, 2021 - crypto.ku.edu.tr
This paper discusses a new passport program that allows the passports to be printed on
paper or carried in a smartphone application by the passport holders, without any …
paper or carried in a smartphone application by the passport holders, without any …