Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
نویسندگان
چکیده
منابع مشابه
The Secure Integrity Verification in Cloud Storage Auditing with Deduplication
The cloud computing innovation appeared amid the21st century; outsourcing data to cloud benefit for capacity turns into a helpful yet proficient pattern, which benefits in saving endeavors on data support and administration. By the by, since the outsourced cloud stockpiling administration is not completely reliable, it raises security worries on the most proficient method to acknowledge data de...
متن کاملSecure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
Cloud computing provides a flexible and convenient way for data sharing, which brings various benefits for both the society and individuals. But there exists a natural resistance for users to directly outsource the shared data to the cloud server since the data often contain valuable information. Thus, it is necessary to place cryptographically enhanced access control on the shared data. Identi...
متن کاملPublic Auditing For Secure Cloud Storage with HLA
Cloud computing is internet based computing which enables sharing of services. Many users place their data in the cloud. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in cloud computing a very challenging and potentially formidable task, especially for users with constrained computing resources a...
متن کاملEnabling efficient and secure data sharing in cloud computing
With the rapid development of cloud computing, more and more data are being centralized into remote cloud server for sharing, which raises a challenge on how to keep them both private and accessible. Although searchable encryption provides an efficient solution to support keyword-based search directly on encrypted data, considering its application in file sharing, existing work depends on key s...
متن کاملPublic Data Integrity Verification for Secure Cloud Storage
Cloud storage can provide a flexible on-demand data storage service to users anywhere and anytime. However, users’ data is owned by cloud service providers physically, and the physical boundary between two users’ data is fuzzy. In this environment not controlled by users, a method to ensure users’ data integrity must be provided. In order to avoid retrieving enormous storage data and users them...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2019
ISSN: 1556-6013,1556-6021
DOI: 10.1109/tifs.2018.2850312