Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








355 Hits in 5.4 sec

An efficient $$\mathcal{iO}$$ i O -based data integrity verification scheme for cloud storage

Lixue Sun, Chunxiang Xu, Yuan Zhang, Kefei Chen
2018 Science China Information Sciences  
The responsibility for scientific accuracy and content remains entirely with the authors.  ...  Acknowledgements This work was supported by National Key R&D Program of China (Grant No. 2017YFB0802000) and National Natural Science Foundation of China (Grant No. 61370203).  ...  The proposed data integrity verification scheme comprises three elements: a cloud user, a TPA, and a cloud server. The cloud user uploads his data files to the cloud server for storage.  ... 
doi:10.1007/s11432-018-9500-0 fatcat:or3jftfaabacfpd2hla45y3h3a

Towards Lightweight Provable Data Possession for Cloud Storage Using Indistinguishability Obfuscation

Smita Chaudhari, Gandharba Swain
2022 IEEE Access  
Public auditing is one process that enables users to delegate the integrity verification of outsourced data to external party such as Third-Party Auditor (TPA).  ...  Cloud Computing has proved to be a boon for many individuals and organizations who cannot afford infrastructure and maintenance cost of resources.  ...  Public auditing for cloud storage system comprises Cloud users, CS, and TPA.  ... 
doi:10.1109/access.2022.3159699 fatcat:zdffidmjpfdkbbz5b3u3elnvwy

Efficient and Secure Group based Collusion Resistant Public Auditing Scheme for Cloud Storage

Smita Chaudhari, Gandharba Swain
2021 International Journal of Advanced Computer Science and Applications  
To verify the integrity of outsourced data, proposed scheme uses one of the modern cryptographic technique indistinguishability obfuscation combined with a one-way function which can reduce the verification  ...  But these techniques are costly in terms of communication overhead and verification cost if combined with auditing techniques to prove the integrity of outsourced data on the cloud server.  ...  ACKNOWLEDGEENT This research work is an independent work and no financial assistance has been received for this work.  ... 
doi:10.14569/ijacsa.2021.0120356 fatcat:47w5qmuwrrhdvfqrex2wyci5gq

Secure and Verifiable Multi-Party Computation Using Indistinguishability Obfuscation

Smita Chaudhari, Koneru Laxmaiah Education Foundation, Gandharba Swain, Pragnyaban Mishra, Koneru Laxmaiah Education Foundation, Koneru Laxmaiah Education Foundation
2020 International Journal of Intelligent Engineering and Systems  
This paper proposes an improved public auditing technique for multi-party computation to check the integrity of outsourced data using a cryptographic solution.  ...  We propose an efficient protocol that verifies the result correctness using modern cryptographic technique Indistinguishability Obfuscation.  ...  Conflicts of Interest The authors state that there are no conflicts of interest about the publication of this paper.  ... 
doi:10.22266/ijies2020.1031.25 fatcat:fgh2tjr5x5c3pg2mrnajs2pqg4

Symmetric-Key Based Proofs of Retrievability Supporting Public Verification [chapter]

Chaowen Guan, Kui Ren, Fangguo Zhang, Florian Kerschbaum, Jia Yu
2015 Lecture Notes in Computer Science  
In this work we explore indistinguishability obfuscation for building a Proof-of-Retrievability scheme that provides public verification while the encryption is based on symmetric key primitives.  ...  Proofs-of-Retrievability enables a client to store his data on a cloud server so that he executes an efficient auditing protocol to check that the server possesses all of his data in the future.  ...  Acknowledgments This work is supported in part by US National Science Foundation under grant CNS-1262277 and the National Natural Science Foundation of China (Nos. 61379154 and U1135001).  ... 
doi:10.1007/978-3-319-24174-6_11 fatcat:mphmzs2khjaxhnj5u77mm3njl4

Privacy Preserving Dynamic Provable Data Possession with Batch Update for Secure Cloud Storage

Smita Chaudhari, Gandharba Swain
2021 International Journal of Advanced Computer Science and Applications  
Provable Data Possession (PDP) is a model that allows Third Party Auditor (TPA) to verify the integrity of outsourced data on behalf of cloud user without downloading the data files.  ...  But this public auditing model faces many security and performance issues such as: unnecessary computational burden on user as well as on TPA, to preserve identities of users from TPA during auditing,  ...  The workflow for P 2 DPDP scheme from Fig. 2 is as follows: 1) Any cloud user from a group outsources data file on CS.  ... 
doi:10.14569/ijacsa.2021.0120669 fatcat:ubjylmcitra7jlgyc5mjs3axua

A Secured Public Auditing Protocol with Dynamic Structure for Cloud Data

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
hiding for secure cloud storage.  ...  At present Cloud computing is a very successful paradigm for data computing and storage. It Increases the concerns about data security and privacy in the cloud.  ...  To reduce the burden of signature generation on the user side, Guan et al.designed a remote data integrity auditing scheme based on the indistinguishability obfuscation technique.  ... 
doi:10.35940/ijitee.a1019.1191s19 fatcat:lxdc7ufngbhj5hlga23wrbttzm

Lightweight Delegatable Proofs of Storage [chapter]

Jia Xu, Anjia Yang, Jianying Zhou, Duncan S. Wong
2016 Lecture Notes in Computer Science  
a cloud storage server, without keeping a local copy of data or downloading data back during auditing.  ...  Proofs of storage (including Proofs of Retrievability and Provable Data Possession) is a cryptographic tool, which enables data owner or third party auditor to audit integrity of data stored remotely in  ...  The benefit of publicly verifiable POS schemes is that, anyone with the public key can audit the integrity of data in cloud storage, to relieve the burden from the data owner.  ... 
doi:10.1007/978-3-319-45744-4_16 fatcat:uwx7wsfh2vew3jwhc44skg5ely

Authorizing Identity based Integrity Auditing and Data Assigning with Responsive Information Hiding for Cloud

Siva Priya
2019 International Journal for Research in Applied Science and Engineering Technology  
Authorizing based on Identity-based cloud storage auditing schemes can check the security of cloud data. It contains the confidential information that must be protected from unauthorized access.  ...  By using the authentication key, the data owner and the data user enter into the cloud to upload and to download the data from the cloud.  ...  [7] designed a remote data integrity auditing scheme based on the indistinguishability obfuscation technique. Shen et al.  ... 
doi:10.22214/ijraset.2019.5485 fatcat:sxjnkcz775gkretr3owfzmgamm

LDVAS: Lattice-Based Designated Verifier Auditing Scheme for Electronic Medical Data in Cloud-Assisted WBANs

Xiaojun Zhang, Chao Huang, Yuan Zhang, Jingwei Zhang, Jie Gong
2020 IEEE Access  
Data auditing contributes to medical data integrity verification, but most of existing data auditing schemes are vulnerable to attackers equipped with practical quantum-computing devices, which are very  ...  Data integrity has become an extremely important security issue in cloud-assisted wireless body area networks (WBANs).  ...  [12] formally presented a pairing-based public auditing scheme for cloud storage, which relies on a third-party auditor (TPA) to fulfil the data integrity verification tasks on behalf of the data owner  ... 
doi:10.1109/access.2020.2981503 fatcat:pm7tqj7dsrg2jink356lrs56pm

A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing

Haorui Du, Jianhua Chen, Fei Lin, Cong Peng, Debiao He, Youwen Zhu
2022 Security and Communication Networks  
Apart from this, complex retrieval requirements and the integrity of the results had not been considered.  ...  Cloud computing can provide users with sufficient computing resources, storage, and bandwidth to meet their needs. Data security and privacy protection are among the new threats faced by users.  ...  Based on the high efficiency and low cost that cloud computing can provide, cloud computing has attracted a great deal of attention from academia as well as industry in the past decade.  ... 
doi:10.1155/2022/2309834 fatcat:2kftjgjn5fc73ejrpl57us5wpe

FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE Scheme [chapter]

Laltu Sardar, Sushmita Ruj
2019 Lecture Notes in Computer Science  
Verifiable dynamic SSE requires the server to give a proof of the result of the search query. The data owner can verify this proof efficiently.  ...  In SSE setting, the data owner has very low computation and storage power.  ...  [7] have presented a VSSE scheme for static data based on the secure indistinguishability obfuscation.  ... 
doi:10.1007/978-3-030-31919-9_23 fatcat:b3f6gm6btrbijmmjy6hgqr7fii

A New Secure Memory System for Efficient Data Protection and Access Pattern Obfuscation [article]

Haoran Geng, Yuezhi Che, Aaron Dingler, Michael Niemier, Xiaobo Sharon Hu
2024 arXiv   pre-print
patterns, and enables efficient integrity verification.  ...  In addition, SSM incorporates lightweight, thus integrated mechanisms for integrity assurance, protecting against data tampering.  ...  ORAM works by obfuscating the access patterns to memory, such that each access appears random and computationally indistinguishable from any other.  ... 
arXiv:2402.15824v1 fatcat:3spvf5pvc5e25l5ppjs3ckxwjq

Dynamic List Based Data Integrity Verification in Cloud Environment

Akshay KC, Balachandra Muniyal
2022 Journal of Cyber Security and Mobility  
In this respect, a conceivable solution is proposed for dynamic reviewing by making use of a dynamic list-based index table to verify the integrity of the data which is more efficient than the state of  ...  In any case, due to the partition of information ownership and administration, it becomes exceptionally troublesome for the users or the owners to verify the integrity of data in a routine way.  ...  [17] projected a cloud storage system that supports the privacy-preserving public auditing and monitoring.  ... 
doi:10.13052/jcsm2245-1439.1134 fatcat:pzlg3sx47nffhovj4tk5wp35ve

Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage

Wenting Shen, Jing Qin, Jia Yu, Rong Hao, Jiankun Hu
2019 IEEE Transactions on Information Forensics and Security  
Remote data integrity auditing is proposed to guarantee the integrity of the data stored in the cloud.  ...  In some common cloud storage systems such as the electronic health records system, the cloud file might contain some sensitive information.  ...  [7] designed a remote data integrity auditing scheme based on the indistinguishability obfuscation technique. Shen et al.  ... 
doi:10.1109/tifs.2018.2850312 fatcat:iz4ugmp2zbbhpnksvfhjpbgjbq
« Previous Showing results 1 — 15 out of 355 results