[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Hsien et al., 2016 - Google Patents

A Survey of Public Auditing for Secure Data Storage in Cloud Computing.

Hsien et al., 2016

View PDF
Document ID
7422073444499171370
Author
Hsien W
Yang C
Hwang M
Publication year
Publication venue
Int. J. Netw. Secur.

External Links

Snippet

Cloud computing has been popular as the IT architecture. Cloud service providers offer many services based on cloud computing. Cloud storage service is the cloud services which can provide a huge storage space to solve the bottleneck of the storage space of local end …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Hsien et al. A Survey of Public Auditing for Secure Data Storage in Cloud Computing.
Zhang et al. Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation
Zhang et al. SCLPV: Secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors
EP2348447B1 (en) A computer implemented method for generating a set of identifiers from a private key, computer implemented method and computing device
Abadi et al. O-PSI: delegated private set intersection on outsourced datasets
Liu et al. A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing.
Sun et al. Outsourced decentralized multi-authority attribute based signature and its application in IoT
Velliangiri et al. An efficient lightweight privacy-preserving mechanism for industry 4.0 based on elliptic curve cryptography
Liu et al. Protecting mobile health records in cloud computing: A secure, efficient, and anonymous design
CN104092686B (en) The method of secret protection and Data Access Security based on SVM classifier
CN113554436B (en) User identity anonymizing method, tracking method and system of blockchain system
Carter et al. For your phone only: custom protocols for efficient secure function evaluation on mobile devices
Subha et al. Efficient privacy preserving integrity checking model for cloud data storage security
Sucasas et al. Attribute-based pseudonymity for privacy-preserving authentication in cloud services
Mishra et al. Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment
Meshram et al. A provably secure lightweight subtree-based short signature scheme with fuzzy user data sharing for human-centered IoT
Alimohammadi et al. A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage
Salvakkam et al. An improved lattice based certificateless data integrity verification techniques for cloud computing
Schumm et al. Efficient credential revocation using cryptographic accumulators
Wang et al. Gmatch: Secure and privacy-preserving group matching in social networks
Rehman et al. Securing cloud storage by remote data integrity check with secured key generation
CN113792282B (en) Identity data verification method and device, computer equipment and storage medium
Slamanig More privacy for cloud users: Privacy-preserving resource usage in the cloud
Abusalah et al. Constrained PRFs for unbounded inputs with short keys
Lin et al. F2P‐ABS: A Fast and Secure Attribute‐Based Signature for Mobile Platforms