Journal ArticleDOI
An efficient data integrity auditing protocol for cloud computing
Reads0
Chats0
TLDR
An efficient approach for data integrity auditing in cloud computing is proposed and the results obtained have been compared with state-of-the-art protocols and demonstrates the high efficiency and adaptability of proposed protocol by clients with limited resources.About:
This article is published in Future Generation Computer Systems.The article was published on 2020-08-01. It has received 56 citations till now. The article focuses on the topics: Cloud computing & Data integrity.read more
Citations
More filters
Posted Content
PORs: Proofs of Retrievability for Large Files
Ari Juels,Burton S. Kaliski +1 more
TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Journal ArticleDOI
Comparison Among Cloud Technologies and Cloud Performance
TL;DR: This paper reviews in detail the cloud computing system, its used technologies, and the best technologies used with it according to multiple factors and criteria such as the procedure cost, speed cons and pros.
Journal ArticleDOI
Improving the Financial Security of National Health Insurance using Cloud-Based Blockchain Technology Application
TL;DR: In this article , the authors proposed a blockchain-based solution to protect the National Health Insurance Scheme (NHIS) from plummeting in both developed and developing countries, and evaluated the behavioral aspect of the system using the DeLone & McLean Information Systems Success Model.
Journal ArticleDOI
A secure and Efficient Public Auditing System of Cloud Storage Based on BLS Signature and Automatic Blocker protocol
TL;DR: This paper proposes an effective public auditing system for cloud data based on the signature of Boneh-Lynn-Shacham (BLS) in order to ensure publicauditing and maintain data privacy and enhances the level of security authentication through an Automatic Blocker Protocol (ABP) to protect the system from unauthorized TPA.
Journal ArticleDOI
A Blockchain-Based Public Auditing Protocol with Self-Certified Public Keys for Cloud Data
TL;DR: Li et al. as mentioned in this paper proposed a public auditing protocol with a self-certified public key system using blockchain technology, where the user's operational information and metadata information of the file are formed to a block after verified by the checked nodes and then to be put into the blockchain.
References
More filters
ReportDOI
The NIST Definition of Cloud Computing
Peter Mell,Timothy Grance +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Journal ArticleDOI
A view of cloud computing
Michael Armbrust,Armando Fox,Rean Griffith,Anthony D. Joseph,Randy H. Katz,Andy Konwinski,Gunho Lee,David A. Patterson,Ariel Rabkin,Ion Stoica,Matei Zaharia +10 more
TL;DR: The clouds are clearing the clouds away from the true potential and obstacles posed by this computing capability.
Book ChapterDOI
Identity-Based Encryption from the Weil Pairing
Dan Boneh,Matthew K. Franklin +1 more
TL;DR: This work proposes a fully functional identity-based encryption scheme (IBE) based on the Weil pairing that has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem.
Book ChapterDOI
Identity-based cryptosystems and signature schemes
TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Journal ArticleDOI
Identity-Based Encryption from the Weil Pairing
Dan Boneh,Matthew K. Franklin +1 more
TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.