Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2009
Abstract. Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous work has shown that proofs of storage can be constructed from any homomorphic linear authenticator (HLA). The latter, roughly speaking, are signature/message authentication schemes where 'tags' on multiple messages can be homomorphically combined to yield a 'tag'on any linear combination of these messages.
Concurrency and Computation: Practice and Experience
New public auditing protocol based on homomorphic tags for secure cloud storage2019 •
SummaryOutsourcing datum to the cloud servers is more and more popular for most data owners and enterprises. However, how to ensure the outsourced datum to be kept secure is very important. Especially, how to check the outsourced datum's integrity is a very challenge problem. Until now, there are many cryptographic protocols proposed to solve this problem, such as (dynamic) provable data position protocol, (dynamic) proof of retrievability protocol, etc. Recently, Tian et al proposed a dynamic‐hash‐table‐based public auditing scheme for secure cloud storage, which aims at simultaneously supporting secure dynamic data updating and secure public auditing for cloud storage. However, we find a security flaw in this protocol; concretely, the signature algorithm for the data blocks in their protocol is not secure; the cloud servers can easily modify the outsourced data blocks without detecting. Finally, we give a new protocol by using homomorphic tags based on their protocol and rough...
Lecture Notes in Computer Science
Authenticating Computation on Groups: New Homomorphic Primitives and Applications2014 •
The prospect of outsourcing an increasing amount of data to a third party and the abstract nature of the cloud promote the proliferation of security and privacy challenges, namely, the remote data possession checking. This paper addresses this security concern, while supporting the verification of several data blocks outsourced across multiple storing nodes. We propose a new set homomorphic proof of data possession, called SHoPS, supporting the verification of aggregated proofs. It proposes a deterministic Proof of Data Possession (PDP) scheme based on interactive proof protocols. Our approach has several advantages. First, it supports public verifiability where the data owner delegates the verification process to another entity, thus releasing him from the burden of periodical verifications. Second, it allows the aggregation of several proofs and the verification of a subset of data files’ proofs while providing an attractive communication overhead.
HAL (Le Centre pour la Communication Scientifique Directe)
A novel proof of data possession scheme based on set-homomorphic operations2016 •
Cloud storage can satisfy the demand of accessing data at anytime, anyplace. In cloud storage, only when the users can verify that the cloud storage server possesses the data correctly, users shall feel relax to use cloud storage. Provable data possession(PDP) makes it easy for a third party to verify whether the data is integrity in the cloud storage server. We analyze the existing PDP schemes, find that these schemes have some drawbacks, such as computationally expensive, only performing a limited number provable data possession. This paper proposes a provable data possession scheme based on homomorphic hash function according to the problems exist in the existing algorithms. The advantage of homomorphic hash function is that it provides provable data possession and data integrity protection. The scheme is a good way to ensure the integrity of remote data and reduce redundant storage space and bandwidth consumption on the premise that users do not retrieve data. The main cost of the scheme is in the server side, it is suitable for mobile devices in the cloud storage environments. We prove that the scheme is feasible by analyzing the security and performance of the scheme.
Journal of Network and Computer Applications
Structures and data preserving homomorphic signatures2018 •
IEEE Transactions on Cloud Computing
Cooperative Set Homomorphic Proofs for Data Possession Checking in Clouds2018 •
2011 •
2023 •
Inicijal. Časopis za srednjovekovne studije / Initial. A Review of Medieval Studies 10 (2022)
Initial 10 (2022) – ContentsArchaeologia historica
Zaniklá středověká vesnice Zábdiší na panství hradu Žebrák - The deserted medieval village of Zábdiší on the estate of Žebrák Castle2023 •
Antigüedad y Cristianismo
Anejos III: La Región Oretana - PDF Completo2020 •
2017 •
Journal of Differential Geometry
The classification of doubly periodic minimal tori with parallel ends2005 •
Open Journal of Obstetrics and Gynecology
Knowledge, Attitude and Practice of Breast Self-Examination amongst Women in Two Communities of CameroonJournal of Turkish Studies
Nur Dağı (Gavur Dağı) Platosunda Derlenen Bazı Yerel Kelimelerin Etimolojisi Üzerine Bir Değerlendir2013 •
Malaysian Journal of Nutrition
Acceptance and effectiveness of the Healthier Choice Logo (HCL) among food industries in MalaysiaAcademia Medicine
The enigma of cancer polyploidy as deciphered by evolutionary cancer stem cell biology (ECCB)2024 •
2022 •