[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Tian et al., 2021 - Google Patents

Data integrity auditing for secure cloud storage using user behavior prediction

Tian et al., 2021

Document ID
3837846289224966376
Author
Tian J
Wang H
Wang M
Publication year
Publication venue
Computers & Security

External Links

Snippet

Data integrity is a core security issue in reliable cloud storage that has received widespread attention. Data auditing protocols enable verifiers to efficiently check the integrity of outsourced data without downloading the data. A key research challenge associated with …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

Similar Documents

Publication Publication Date Title
Yu et al. Strong key-exposure resilient auditing for secure cloud storage
Yu et al. Enabling cloud storage auditing with key-exposure resistance
Li et al. Privacy-preserving public auditing protocol for low-performance end devices in cloud
Tian et al. Data integrity auditing for secure cloud storage using user behavior prediction
Lu et al. An integrity verification scheme of cloud storage for internet-of-things mobile terminal devices
Sun et al. Outsourced decentralized multi-authority attribute based signature and its application in IoT
US20160269397A1 (en) Reissue of cryptographic credentials
Li et al. A Blockchain‐Based Public Auditing Scheme for Cloud Storage Environment without Trusted Auditors
CN114691669A (en) Electronic certificate storage method and device, electronic equipment and storage medium
Lacharité Security of BLS and BGLS signatures in a multi-user setting
Mishra et al. Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment
Kim et al. Privacy-preserving public auditing for educational multimedia data in cloud computing
Zhang et al. Efficient blockchain-based data integrity auditing for multi-copy in decentralized storage
CN108768975A (en) Support the data integrity verification method of key updating and third party's secret protection
Xu et al. A blockchain-based dynamic searchable symmetric encryption scheme under multiple clouds
Wu et al. Secure public data auditing scheme for cloud storage in smart city
Song et al. Enabling transparent deduplication and auditing for encrypted data in cloud
Xia et al. An improved privacy preserving construction for data integrity verification in cloud storage
Xu et al. A generic integrity verification algorithm of version files for cloud deduplication data storage
CN109104449B (en) A Multi-Backup Data Possession Proof Method in Cloud Storage Environment
Li et al. A forward-secure certificate-based signature scheme
Li et al. WiBPA: an efficient data integrity auditing scheme without bilinear pairings
Cao et al. A scheme for verification on data integrity in mobile multicloud computing environment
Chen et al. A remote data integrity checking scheme for big data storage
Hu et al. Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks