A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
An efficient $$\mathcal{iO}$$ i O -based data integrity verification scheme for cloud storage
2018
Science China Information Sciences
The responsibility for scientific accuracy and content remains entirely with the authors. ...
Acknowledgements This work was supported by National Key R&D Program of China (Grant No. 2017YFB0802000) and National Natural Science Foundation of China (Grant No. 61370203). ...
The proposed data integrity verification scheme comprises three elements: a cloud user, a TPA, and a cloud server. The cloud user uploads his data files to the cloud server for storage. ...
doi:10.1007/s11432-018-9500-0
fatcat:or3jftfaabacfpd2hla45y3h3a
Towards Lightweight Provable Data Possession for Cloud Storage Using Indistinguishability Obfuscation
2022
IEEE Access
Public auditing is one process that enables users to delegate the integrity verification of outsourced data to external party such as Third-Party Auditor (TPA). ...
Cloud Computing has proved to be a boon for many individuals and organizations who cannot afford infrastructure and maintenance cost of resources. ...
Public auditing for cloud storage system comprises Cloud users, CS, and TPA. ...
doi:10.1109/access.2022.3159699
fatcat:zdffidmjpfdkbbz5b3u3elnvwy
Efficient and Secure Group based Collusion Resistant Public Auditing Scheme for Cloud Storage
2021
International Journal of Advanced Computer Science and Applications
To verify the integrity of outsourced data, proposed scheme uses one of the modern cryptographic technique indistinguishability obfuscation combined with a one-way function which can reduce the verification ...
But these techniques are costly in terms of communication overhead and verification cost if combined with auditing techniques to prove the integrity of outsourced data on the cloud server. ...
ACKNOWLEDGEENT This research work is an independent work and no financial assistance has been received for this work. ...
doi:10.14569/ijacsa.2021.0120356
fatcat:47w5qmuwrrhdvfqrex2wyci5gq
Secure and Verifiable Multi-Party Computation Using Indistinguishability Obfuscation
2020
International Journal of Intelligent Engineering and Systems
This paper proposes an improved public auditing technique for multi-party computation to check the integrity of outsourced data using a cryptographic solution. ...
We propose an efficient protocol that verifies the result correctness using modern cryptographic technique Indistinguishability Obfuscation. ...
Conflicts of Interest The authors state that there are no conflicts of interest about the publication of this paper. ...
doi:10.22266/ijies2020.1031.25
fatcat:fgh2tjr5x5c3pg2mrnajs2pqg4
Symmetric-Key Based Proofs of Retrievability Supporting Public Verification
[chapter]
2015
Lecture Notes in Computer Science
In this work we explore indistinguishability obfuscation for building a Proof-of-Retrievability scheme that provides public verification while the encryption is based on symmetric key primitives. ...
Proofs-of-Retrievability enables a client to store his data on a cloud server so that he executes an efficient auditing protocol to check that the server possesses all of his data in the future. ...
Acknowledgments This work is supported in part by US National Science Foundation under grant CNS-1262277 and the National Natural Science Foundation of China (Nos. 61379154 and U1135001). ...
doi:10.1007/978-3-319-24174-6_11
fatcat:mphmzs2khjaxhnj5u77mm3njl4
Privacy Preserving Dynamic Provable Data Possession with Batch Update for Secure Cloud Storage
2021
International Journal of Advanced Computer Science and Applications
Provable Data Possession (PDP) is a model that allows Third Party Auditor (TPA) to verify the integrity of outsourced data on behalf of cloud user without downloading the data files. ...
But this public auditing model faces many security and performance issues such as: unnecessary computational burden on user as well as on TPA, to preserve identities of users from TPA during auditing, ...
The workflow for P 2 DPDP scheme from Fig. 2 is as follows: 1) Any cloud user from a group outsources data file on CS. ...
doi:10.14569/ijacsa.2021.0120669
fatcat:ubjylmcitra7jlgyc5mjs3axua
A Secured Public Auditing Protocol with Dynamic Structure for Cloud Data
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
hiding for secure cloud storage. ...
At present Cloud computing is a very successful paradigm for data computing and storage. It Increases the concerns about data security and privacy in the cloud. ...
To reduce the burden of signature generation on the user side, Guan et al.designed a remote data integrity auditing scheme based on the indistinguishability obfuscation technique. ...
doi:10.35940/ijitee.a1019.1191s19
fatcat:lxdc7ufngbhj5hlga23wrbttzm
Lightweight Delegatable Proofs of Storage
[chapter]
2016
Lecture Notes in Computer Science
a cloud storage server, without keeping a local copy of data or downloading data back during auditing. ...
Proofs of storage (including Proofs of Retrievability and Provable Data Possession) is a cryptographic tool, which enables data owner or third party auditor to audit integrity of data stored remotely in ...
The benefit of publicly verifiable POS schemes is that, anyone with the public key can audit the integrity of data in cloud storage, to relieve the burden from the data owner. ...
doi:10.1007/978-3-319-45744-4_16
fatcat:uwx7wsfh2vew3jwhc44skg5ely
Authorizing Identity based Integrity Auditing and Data Assigning with Responsive Information Hiding for Cloud
2019
International Journal for Research in Applied Science and Engineering Technology
Authorizing based on Identity-based cloud storage auditing schemes can check the security of cloud data. It contains the confidential information that must be protected from unauthorized access. ...
By using the authentication key, the data owner and the data user enter into the cloud to upload and to download the data from the cloud. ...
[7] designed a remote data integrity auditing scheme based on the indistinguishability obfuscation technique. Shen et al. ...
doi:10.22214/ijraset.2019.5485
fatcat:sxjnkcz775gkretr3owfzmgamm
LDVAS: Lattice-Based Designated Verifier Auditing Scheme for Electronic Medical Data in Cloud-Assisted WBANs
2020
IEEE Access
Data auditing contributes to medical data integrity verification, but most of existing data auditing schemes are vulnerable to attackers equipped with practical quantum-computing devices, which are very ...
Data integrity has become an extremely important security issue in cloud-assisted wireless body area networks (WBANs). ...
[12] formally presented a pairing-based public auditing scheme for cloud storage, which relies on a third-party auditor (TPA) to fulfil the data integrity verification tasks on behalf of the data owner ...
doi:10.1109/access.2020.2981503
fatcat:pm7tqj7dsrg2jink356lrs56pm
A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing
2022
Security and Communication Networks
Apart from this, complex retrieval requirements and the integrity of the results had not been considered. ...
Cloud computing can provide users with sufficient computing resources, storage, and bandwidth to meet their needs. Data security and privacy protection are among the new threats faced by users. ...
Based on the high efficiency and low cost that cloud computing can provide, cloud computing has attracted a great deal of attention from academia as well as industry in the past decade. ...
doi:10.1155/2022/2309834
fatcat:2kftjgjn5fc73ejrpl57us5wpe
FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE Scheme
[chapter]
2019
Lecture Notes in Computer Science
Verifiable dynamic SSE requires the server to give a proof of the result of the search query. The data owner can verify this proof efficiently. ...
In SSE setting, the data owner has very low computation and storage power. ...
[7] have presented a VSSE scheme for static data based on the secure indistinguishability obfuscation. ...
doi:10.1007/978-3-030-31919-9_23
fatcat:b3f6gm6btrbijmmjy6hgqr7fii
A New Secure Memory System for Efficient Data Protection and Access Pattern Obfuscation
[article]
2024
arXiv
pre-print
patterns, and enables efficient integrity verification. ...
In addition, SSM incorporates lightweight, thus integrated mechanisms for integrity assurance, protecting against data tampering. ...
ORAM works by obfuscating the access patterns to memory, such that each access appears random and computationally indistinguishable from any other. ...
arXiv:2402.15824v1
fatcat:3spvf5pvc5e25l5ppjs3ckxwjq
Dynamic List Based Data Integrity Verification in Cloud Environment
2022
Journal of Cyber Security and Mobility
In this respect, a conceivable solution is proposed for dynamic reviewing by making use of a dynamic list-based index table to verify the integrity of the data which is more efficient than the state of ...
In any case, due to the partition of information ownership and administration, it becomes exceptionally troublesome for the users or the owners to verify the integrity of data in a routine way. ...
[17] projected a cloud storage system that supports the privacy-preserving public auditing and monitoring. ...
doi:10.13052/jcsm2245-1439.1134
fatcat:pzlg3sx47nffhovj4tk5wp35ve
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
2019
IEEE Transactions on Information Forensics and Security
Remote data integrity auditing is proposed to guarantee the integrity of the data stored in the cloud. ...
In some common cloud storage systems such as the electronic health records system, the cloud file might contain some sensitive information. ...
[7] designed a remote data integrity auditing scheme based on the indistinguishability obfuscation technique. Shen et al. ...
doi:10.1109/tifs.2018.2850312
fatcat:iz4ugmp2zbbhpnksvfhjpbgjbq
« Previous
Showing results 1 — 15 out of 355 results