Tian et al., 2021 - Google Patents
Data integrity auditing for secure cloud storage using user behavior predictionTian et al., 2021
- Document ID
- 3837846289224966376
- Author
- Tian J
- Wang H
- Wang M
- Publication year
- Publication venue
- Computers & Security
External Links
Snippet
Data integrity is a core security issue in reliable cloud storage that has received widespread attention. Data auditing protocols enable verifiers to efficiently check the integrity of outsourced data without downloading the data. A key research challenge associated with …
- 238000000034 method 0 abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2119—Authenticating web pages, e.g. with suspicious links
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yu et al. | Strong key-exposure resilient auditing for secure cloud storage | |
Yu et al. | Enabling cloud storage auditing with key-exposure resistance | |
Li et al. | Privacy-preserving public auditing protocol for low-performance end devices in cloud | |
Tian et al. | Data integrity auditing for secure cloud storage using user behavior prediction | |
Lu et al. | An integrity verification scheme of cloud storage for internet-of-things mobile terminal devices | |
Sun et al. | Outsourced decentralized multi-authority attribute based signature and its application in IoT | |
US20160269397A1 (en) | Reissue of cryptographic credentials | |
Li et al. | A Blockchain‐Based Public Auditing Scheme for Cloud Storage Environment without Trusted Auditors | |
CN114691669A (en) | Electronic certificate storage method and device, electronic equipment and storage medium | |
Lacharité | Security of BLS and BGLS signatures in a multi-user setting | |
Mishra et al. | Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment | |
Kim et al. | Privacy-preserving public auditing for educational multimedia data in cloud computing | |
Zhang et al. | Efficient blockchain-based data integrity auditing for multi-copy in decentralized storage | |
CN108768975A (en) | Support the data integrity verification method of key updating and third party's secret protection | |
Xu et al. | A blockchain-based dynamic searchable symmetric encryption scheme under multiple clouds | |
Wu et al. | Secure public data auditing scheme for cloud storage in smart city | |
Song et al. | Enabling transparent deduplication and auditing for encrypted data in cloud | |
Xia et al. | An improved privacy preserving construction for data integrity verification in cloud storage | |
Xu et al. | A generic integrity verification algorithm of version files for cloud deduplication data storage | |
CN109104449B (en) | A Multi-Backup Data Possession Proof Method in Cloud Storage Environment | |
Li et al. | A forward-secure certificate-based signature scheme | |
Li et al. | WiBPA: an efficient data integrity auditing scheme without bilinear pairings | |
Cao et al. | A scheme for verification on data integrity in mobile multicloud computing environment | |
Chen et al. | A remote data integrity checking scheme for big data storage | |
Hu et al. | Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks |