Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
نویسندگان
چکیده
منابع مشابه
Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing
In this project the utilization and combining of public key based homomorphic authenticator with random masking to achieve the preservation of privacy to the public cloud data auditing system which meets all the above requirements. If there is a situation for multi auditing tasks then we further extend the technique of bilinear aggregate signature to extend the main result to multi user setting...
متن کاملIdentity-based data storage in cloud computing
Identity-based proxy re-encryption schemes have been proposed to shift the burden of managing numerous files from the owner to a proxy server. Nevertheless, the existing solutions suffer from several drawbacks. First, the access permission is determined by the central authority, which makes the scheme impractical. Second, they are insecure against collusion attacks. Finally, only queries from t...
متن کاملIdentity-Based Integrity Verification using PDP in Multi Cloud Storage
Cloud computing has become an important thing in computer field. Cloud computing takes information processing as a service, such as storage and computing. Data integrity is important thing in cloud storage. In certain situations, clients should store their data such as image or text in multi cloud. When the client stores his/her data on multicloud servers, the distributed storage and integrity ...
متن کاملThe Secure Integrity Verification in Cloud Storage Auditing with Deduplication
The cloud computing innovation appeared amid the21st century; outsourcing data to cloud benefit for capacity turns into a helpful yet proficient pattern, which benefits in saving endeavors on data support and administration. By the by, since the outsourced cloud stockpiling administration is not completely reliable, it raises security worries on the most proficient method to acknowledge data de...
متن کاملAuditing cloud storage for continuous storage security
Cloud storage permits users to remotely store their knowledge and revel in the on-demand top quality cloud applications while not the burden of native hardware and software package management. Though the advantages are clear, such a service is addition relinquishing users’ physical possession of their outsourced knowledge, which necessarily poses new security risks towards the correctness of th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2019
ISSN: 1545-5971,1941-0018,2160-9209
DOI: 10.1109/tdsc.2017.2662216