Chen et al., 2017 - Google Patents
An approach to verifying data integrity for cloud storageChen et al., 2017
- Document ID
- 6708957585299125181
- Author
- Chen Y
- Li L
- Chen Z
- Publication year
- Publication venue
- 2017 13th International Conference on Computational Intelligence and Security (CIS)
External Links
Snippet
The developments of cloud computing technology and reliable modern network have been motivating users to store data in cloud servers and rendering security of cloud computing a focus of attention. While data security can be ensured by data encryption technology, data …
- 238000005516 engineering process 0 abstract description 7
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Blockchain-based public auditing for big data in cloud storage | |
Chen et al. | An approach to verifying data integrity for cloud storage | |
CN111639361B (en) | A block chain key management method, multi-person co-signature method and electronic device | |
Shen et al. | An efficient public auditing protocol with novel dynamic structure for cloud data | |
Yu et al. | Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage | |
Ray et al. | Secure logging as a service—delegating log management to the cloud | |
KR20210134655A (en) | Security systems and related methods | |
CN105939191A (en) | Client secure deduplication method of ciphertext data in cloud storage | |
Karbasi et al. | A post-quantum end-to-end encryption over smart contract-based blockchain for defeating man-in-the-middle and interception attacks | |
Nirmala et al. | Data confidentiality and integrity verification using user authenticator scheme in cloud | |
Li et al. | Lattice-based privacy-preserving and forward-secure cloud storage public auditing scheme | |
Subha et al. | Efficient privacy preserving integrity checking model for cloud data storage security | |
Yu et al. | Decim: Detecting endpoint compromise in messaging | |
CN113868715A (en) | Signature method and system based on quantum key | |
Chen et al. | Message‐locked proof of ownership and retrievability with remote repairing in cloud | |
Zhang et al. | Blockchain-Based Privacy-Preserving Deduplication and Integrity Auditing in Cloud Storage | |
Hussien et al. | Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext | |
Bhagyashri et al. | Privacy-preserving public auditing for secure cloud storage | |
Liu et al. | A hash-based secure interface on plain connection | |
Tian et al. | A Survey on Data Integrity Attacks and DDoS Attacks in Cloud Computing | |
Yang et al. | Provable Ownership of Encrypted Files in De-duplication Cloud Storage. | |
Kumar et al. | Hash based approach for providing privacy and integrity in cloud data storage using digital signatures | |
Navajothi et al. | An efficient, dynamic, privacy preserving public auditing method on untrusted cloud storage | |
Kausalye et al. | Data confidentiality in cloud storage. A survey | |
Abbdal et al. | Secure third party auditor for ensuring data integrity in cloud storage |