A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing
2018
Wireless Communications and Mobile Computing
In this paper, we propose a novel public auditing protocol based on the adjacency-hash table, where dynamic auditing and data updating are more efficient than those of the state of the arts. ...
Moreover, with such an authentication structure, computation and communication costs can be reduced effectively. ...
data auditing. (2) We introduce a novel dynamic structure, AHT, to save data properties for dynamic data auditing. ...
doi:10.1155/2018/3471312
fatcat:3yg2dygepndfrnvvjhgkjbpnve
A SURVEY: CLOUD COMPUTING SECURITY ISSUES AND TECHNIQUES
2017
International Journal of Advanced Research in Computer Science
In the recent years, auditing protocols for cloud storages has been proposed to deal the integrity problem of cloud data. This paper deals with different auditing protocols. ...
Literature survey shows that the protocols are focused on different aspects such as dynamic data operations, privacy protection of the data, the high efficiency, the privacy protection of the identities ...
The public auditing system of data storage security in cloud computing they implemented an efficient construction for the seamless integration of public auditability and data dynamics protocol [11] that ...
doi:10.26483/ijarcs.v8i7.4377
fatcat:yl7umbggmbeshbex4tbviak23a
Efficient and Secure Auditing of Cloud Data with Key -Updating
2016
International Journal of Science and Research (IJSR)
Cloud storage auditing is the process of verifying the integrity of the data stored in public cloud. ...
If secret key for auditing is exposed, most of the current auditing protocols become unable to work. ...
The paper -An efficient and secure dynamic auditing protocol for data storage in cloud computing‖ by K. Yang and X. Jia mainly concentrated on the security issues arrived due to dynamic operations. ...
doi:10.21275/v5i5.nov163986
fatcat:qqf5okwjrnbafmp2cyaynffaye
Enabling Cloud Storage Auditing with Key Exposure Resistance
2016
International Journal of Computer Applications
Cloud storage auditing is viewed as an imperative service to corroborate the veracity of the data in public cloud. ...
Formalized the definition and the security model of auditing protocol with key-exposure resilience and propose such a protocol. ...
In contrast, the verification algorithm does not need a secret key from the auditor in an auditing protocol with public verifiability. ...
doi:10.5120/ijca2016910794
fatcat:vpvk7kuehvavrgigozwovbqkbi
Proficient Justification of Data Accuracy for Cloud Storage Using Dual Protection
2019
International Journal of Scientific Research in Science and Technology
More and more clients would like to keep their data to PCS (public cloud servers) along with the rapid development of cloud computing. ...
Multiple verification tasks from different users can be performed efficiently by the auditor and the cloud-stored data can be updated dynamically. ...
In this paper, we propose a novel public auditing mechanism for the integrity of shared data with efficient user revocation in mind. ...
doi:10.32628/ijsrst196250
fatcat:4b5txdyby5bbrirnxf2qu47zpu
Public Auditing for a Secure Cloud Storage using Dynamic Hash Table
2017
International Journal of Recent Trends in Engineering and Research
In this paper we designed a public auditing scheme for securing data residing on cloud using dynamic hash table(DHT).DHT is a two dimensional data structures sited at a third party auditor(TPA) to keep ...
track of data property information for dynamic auditing. ...
preservation: TPA not allowed to learn actual content of users data stored in cloud storage
Dynamic Hash Table It is an authentic and efficient data structure used to achieve dynamic auditing for cloud ...
doi:10.23883/ijrter.2017.3529.mmycv
fatcat:6xftn43skfga3mjm3aowyzrl7u
Efficient Data Integrity Auditing Supporting Provable Data Update for Secure Cloud Storage
2022
Wireless Communications and Mobile Computing
Subsequently, on the basis of the Merkel sum hash tree (MSHT), we introduce an efficient outsourced data integrity auditing scheme. ...
In this article, we primarily investigate the problem of efficient data integrity auditing supporting provable data update in cloud computing environment. ...
Acknowledgments The authors would like to sincerely thank the anonymous referees for their very valuable time. ...
doi:10.1155/2022/5721917
fatcat:hkf3remrrrgtxgsuni4lxaziua
Comparison of Security and Performance Issues in Fog Enabled Cloud Computing
2018
International Journal of Computer Applications
However, several challenges are addressed in fog computing in terms of security, authentication and authorization, privacy, revocation handling and data auditing techniques. ...
Fog computing is a paradigm that extends the cloud computing and services to the edge of the network. Similar to services to end users. ...
A novel public auditing scheme is proposed for secure cloud storage based on dynamic hash table (DHT), which is a new two-dimensional data structure located at a third parity auditor (TPA) to record the ...
doi:10.5120/ijca2018916511
fatcat:odewnt5xkneojezbx6663xt3ma
A Comprehensive Survey on Storage Techniques in Cloud Computing
2015
International Journal of Computer Applications
work and then constructed a sophisticated public auditing scheme with a protocol that gives provision of dynamic data operation. ...
Public Auditing with Complete Data Dynamics support In the previous work of ensuring remote data integrity there is deficiency of provision of public auditability and dynamic data operation. ...
doi:10.5120/21801-5109
fatcat:yq6bbpsrird4tbrjanpfxzqugq
A Blockchain-Based Public Auditing Protocol with Self-Certified Public Keys for Cloud Data
2021
Security and Communication Networks
This paper proposes a public auditing protocol with a self-certified public key system using blockchain technology. ...
The chain structure of the block ensures the security of auditing data source. ...
[21] designed a novel public auditing protocol based on a new dynamic structure to overcome the drawbacks in [18] . e proposed dynamic structure consists of a doubly linked info table and a location ...
doi:10.1155/2021/6623639
fatcat:xnj3x7nkpjd2leqjde5mxkbqeu
A Metadata Verification Scheme for Data Auditing in Cloud Environment
2012
International Journal on Cloud Computing Services and Architecture
In the process of avoiding such an access this work designs a well secured, novel verification scheme that allows the vulnerable third party to perform verification as well as ensures data privacy in cloud ...
The notion on verifying data for intactness is termed as data auditing and the process is carried out by the client or by a third party auditor delegated by the client. ...
ACKNOWLEDGEMENTS The authors would like to thank all those who have shared their valuable inputs, especially our students Sivaramakrishnan and Rilvana Begum, for their insights, suggestions and time throughout ...
doi:10.5121/ijccsa.2012.2405
fatcat:ucf33fn25vgbhaadbv5wl7xlmm
Public Integrity Checking for Dynamic Data Sharing among Multi Groups
2016
International Journal of Science and Research (IJSR)
This paper concluded as, a efficient integrity auditing scheme for cloud data characterized by multi-user modification, public auditing, high error detection probability, efficient user revocation, resist ...
For that a number of techniques have been proposed for data integrity auditing to ensure user's confidence of their shared data on cloud. ...
We design a novel public auditing mechanism for the integrity of shared data with efficient user revocation. ...
doi:10.21275/v5i5.nov164000
fatcat:dke4i27ccrho7nwlo7cms2vexu
Efficient Audit Services for Data Outsourcing in Clouds
2014
IOSR Journal of Computer Engineering
We also propose an efficient approach based on probabilistic query and periodic verification for improving the performance of audit services. ...
Constructed on interactive proof system (IPS) with the zero knowledge property, our audit service can provide public auditability without downloading raw data and protect privacy of the data. ...
Acknowledgements I would like to take this opportunity for expressing our profound gratitude and deep regards to Mr. P. ...
doi:10.9790/0661-16662428
fatcat:n6c6stwusnenvfvx3i5ix5k5eu
AN EXTENSIVE REVIEW ON DATA INTEGRITY SCHEMES AND SECURITY ISSUES IN CLOUD PARADIGM
2020
Zenodo
Generally, internal entities are responsible for the theft data, this leads to audit the data integrity by the third party. ...
Because of the massive complexities and size of the cloud there is been a threat all the time to the data from the internal and external entities. ...
Employed a secure and an efficient protocol auditing enable dynamics of data for influencing the consumer that information are kept correctly in the cloud. ...
doi:10.5281/zenodo.3953775
fatcat:l2a5wvplynbknmh6x352wfrqzq
Secured Data Storage for RDPC Protocol with Enhanced TPA Auditing Scheme Using MHT in Cloud Computing
IJIREEICE - Electrical, Electronics, Instrumentation and Control
2014
IJIREEICE
IJIREEICE - Electrical, Electronics, Instrumentation and Control
And to enable dynamics of data MHT is used to find the location of each data operation in the RDPC protocol. it allow the third party auditor (TPA) to check the integrity of outsourced data. d. ...
responsible for keeping the data available and accessible.but the security of cloud storage is always the focus of several potential cloud clients,and huge impact for its widespread application. ...
Dynamic Auditing The auditing protocol should support the dynamic updates of the data in the cloud. 3 . ...
doi:10.17148/ijireeice.2014.21111
fatcat:735k3g5cavcmjhou7zsekffy64
« Previous
Showing results 1 — 15 out of 5,753 results