Wu et al., 2018 - Google Patents
Privacy-preserving auditing scheme for shared data in public cloudsWu et al., 2018
- Document ID
- 18068928355262441658
- Author
- Wu L
- Wang J
- Zeadally S
- He D
- Publication year
- Publication venue
- The Journal of Supercomputing
External Links
Snippet
Recent advances in cloud storage have enabled users to outsource large amounts of data to a remote cloud server in order to reduce storage and management costs, and share files among many users in a group. However, how to efficiently audit the integrity of shared data …
- 238000000034 method 0 abstract description 18
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Backes et al. | A Security API for Distributed Social Networks. | |
Morales-Sandoval et al. | A pairing-based cryptographic approach for data security in the cloud | |
Cozzo et al. | Sharing the LUOV: threshold post-quantum signatures | |
Zhang et al. | DOPIV: Post-quantum secure identity-based data outsourcing with public integrity verification in cloud storage | |
Zhang et al. | Improved secure fuzzy auditing protocol for cloud data storage | |
Wu et al. | Privacy-preserving auditing scheme for shared data in public clouds | |
Li et al. | A Blockchain‐Based Public Auditing Scheme for Cloud Storage Environment without Trusted Auditors | |
Tian et al. | Public audit for operation behavior logs with error locating in cloud storage | |
Rabaninejad et al. | An identity-based online/offline secure cloud storage auditing scheme | |
Gudeme et al. | Attribute-based public integrity auditing for shared data with efficient user revocation in cloud storage | |
Darzi et al. | LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid | |
Drucker et al. | Achieving trustworthy Homomorphic Encryption by combining it with a Trusted Execution Environment. | |
Kim et al. | Privacy-preserving public auditing for educational multimedia data in cloud computing | |
Abdulsalam et al. | Decentralized data integrity scheme for preserving privacy in cloud computing | |
Shin et al. | Secure proof of storage with deduplication for cloud storage systems | |
Singh et al. | Public integrity auditing for shared dynamic cloud data | |
Jiang et al. | Quantum-resistant password-based threshold single-sign-on authentication with updatable server private key | |
Ahene et al. | A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid | |
Hou et al. | Efficient audit protocol supporting virtual nodes in cloud storage | |
Bayat et al. | A secure and efficient chaotic maps based authenticated key-exchange protocol for smart grid | |
Zhang et al. | Efficient chameleon hashing-based privacy-preserving auditing in cloud storage | |
Yuan et al. | Enable data privacy, dynamics, and batch in public auditing scheme for cloud storage system | |
Shao et al. | Efficient TPA-based auditing scheme for secure cloud storage | |
Li et al. | A new self-certified signature scheme based on ntrus ing for smart mobile communications | |
Tang et al. | Aggregation‐Based Tag Deduplication for Cloud Storage with Resistance against Side Channel Attack |