Hsien et al., 2016 - Google Patents
A Survey of Public Auditing for Secure Data Storage in Cloud Computing.Hsien et al., 2016
View PDF- Document ID
- 7422073444499171370
- Author
- Hsien W
- Yang C
- Hwang M
- Publication year
- Publication venue
- Int. J. Netw. Secur.
External Links
Snippet
Cloud computing has been popular as the IT architecture. Cloud service providers offer many services based on cloud computing. Cloud storage service is the cloud services which can provide a huge storage space to solve the bottleneck of the storage space of local end …
- 238000011156 evaluation 0 abstract description 6
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hsien et al. | A Survey of Public Auditing for Secure Data Storage in Cloud Computing. | |
| Zhang et al. | Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation | |
| Zhang et al. | SCLPV: Secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors | |
| Abadi et al. | O-PSI: delegated private set intersection on outsourced datasets | |
| EP2348447B1 (en) | A computer implemented method for generating a set of identifiers from a private key, computer implemented method and computing device | |
| Sun et al. | Outsourced decentralized multi-authority attribute based signature and its application in IoT | |
| Liu et al. | A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing. | |
| US8516267B2 (en) | Computer readable storage medium for generating an access key, computer implemented method and computing device | |
| Sucasas et al. | Attribute-based pseudonymity for privacy-preserving authentication in cloud services | |
| CN104092686B (en) | The method of secret protection and Data Access Security based on SVM classifier | |
| CN113554436B (en) | User identity anonymizing method, tracking method and system of blockchain system | |
| Liu et al. | Protecting mobile health records in cloud computing: A secure, efficient, and anonymous design | |
| Carter et al. | For your phone only: custom protocols for efficient secure function evaluation on mobile devices | |
| Mishra et al. | Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment | |
| Salvakkam et al. | An improved lattice based certificateless data integrity verification techniques for cloud computing | |
| CN113792282B (en) | Identity data verification method and device, computer equipment and storage medium | |
| Baccouri et al. | Lightweight authentication scheme based on elliptic curve El Gamal | |
| Meshram et al. | A provably secure lightweight subtree-based short signature scheme with fuzzy user data sharing for human-centered IoT | |
| Alimohammadi et al. | A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage | |
| Ogundoyin et al. | EDAS: Efficient data aggregation scheme for Internet of Things | |
| Xie et al. | Slvc-dida: Signature-less verifiable credential-based issuer-hiding and multi-party authentication for decentralized identity | |
| CN117254927A (en) | Public key encryption method and system for preventing leakage and hiding attribute based on edge calculation | |
| Wang et al. | Gmatch: Secure and privacy-preserving group matching in social networks | |
| Rehman et al. | Securing cloud storage by remote data integrity check with secured key generation | |
| Ramić et al. | BLS-MT-ZKP: a novel approach to selective disclosure of claims from digital credentials |