Chen et al., 2016 - Google Patents
Message‐locked proof of ownership and retrievability with remote repairing in cloudChen et al., 2016
View PDF- Document ID
- 10399604390171611670
- Author
- Chen J
- Zhang L
- He K
- Chen M
- Du R
- Wang L
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
Cloud storage services are widely deployed and employed in recent years. A number of data checking techniques have been proposed for secure cloud storage services. These state‐of‐the‐art schemes only focus on some aspects, such as data integrity, users' …
- 238000000034 method 0 abstract description 14
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shin et al. | A survey of secure data deduplication schemes for cloud storage systems | |
Yang et al. | Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage | |
Li et al. | Secure distributed deduplication systems with improved reliability | |
Kaaniche et al. | A secure client side deduplication scheme in cloud storage environments | |
Xu et al. | Weak leakage-resilient client-side deduplication of encrypted data in cloud storage | |
JP6118778B2 (en) | System and method for securing data in motion | |
Liu et al. | One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage | |
Wang et al. | A key-sharing based secure deduplication scheme in cloud storage | |
Chen et al. | Message‐locked proof of ownership and retrievability with remote repairing in cloud | |
Kumar et al. | TPA auditing to enhance the privacy and security in cloud systems | |
Ahsan et al. | A fog-centric secure cloud storage scheme | |
Du et al. | Proofs of ownership and retrievability in cloud storage | |
Kumar et al. | Data outsourcing: A threat to confidentiality, integrity, and availability | |
Kim et al. | Client‐Side Deduplication to Enhance Security and Reduce Communication Costs | |
Pardeshi et al. | Improving data integrity for data storage security in cloud computing | |
Shin et al. | A Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage. | |
Vasilopoulos et al. | Message-locked proofs of retrievability with secure deduplication | |
Abo-Alian et al. | Auditing-as-a-service for cloud storage | |
Bakro et al. | Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms | |
Yang et al. | Provable Ownership of Encrypted Files in De-duplication Cloud Storage. | |
Navajothi et al. | An efficient, dynamic, privacy preserving public auditing method on untrusted cloud storage | |
Yao et al. | Batch public auditing for distributed mobile cloud computing | |
Park et al. | A symmetric key based deduplicatable proof of storage for encrypted data in cloud storage environments | |
Liu et al. | Security Analysis and Improvements on a Remote Integrity Checking Scheme for Regenerating‐Coding‐Based Distributed Storage | |
Zhou et al. | ESDR: an efficient and secure data repairing paradigm in cloud storage |