scispace - formally typeset
Journal ArticleDOI

An efficient data integrity auditing protocol for cloud computing

Reads0
Chats0
TLDR
An efficient approach for data integrity auditing in cloud computing is proposed and the results obtained have been compared with state-of-the-art protocols and demonstrates the high efficiency and adaptability of proposed protocol by clients with limited resources.
About
This article is published in Future Generation Computer Systems.The article was published on 2020-08-01. It has received 56 citations till now. The article focuses on the topics: Cloud computing & Data integrity.

read more

Citations
More filters
Posted Content

PORs: Proofs of Retrievability for Large Files

TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Journal ArticleDOI

Comparison Among Cloud Technologies and Cloud Performance

TL;DR: This paper reviews in detail the cloud computing system, its used technologies, and the best technologies used with it according to multiple factors and criteria such as the procedure cost, speed cons and pros.
Journal ArticleDOI

Improving the Financial Security of National Health Insurance using Cloud-Based Blockchain Technology Application

TL;DR: In this article , the authors proposed a blockchain-based solution to protect the National Health Insurance Scheme (NHIS) from plummeting in both developed and developing countries, and evaluated the behavioral aspect of the system using the DeLone & McLean Information Systems Success Model.
Journal ArticleDOI

A secure and Efficient Public Auditing System of Cloud Storage Based on BLS Signature and Automatic Blocker protocol

TL;DR: This paper proposes an effective public auditing system for cloud data based on the signature of Boneh-Lynn-Shacham (BLS) in order to ensure publicauditing and maintain data privacy and enhances the level of security authentication through an Automatic Blocker Protocol (ABP) to protect the system from unauthorized TPA.
Journal ArticleDOI

A Blockchain-Based Public Auditing Protocol with Self-Certified Public Keys for Cloud Data

TL;DR: Li et al. as mentioned in this paper proposed a public auditing protocol with a self-certified public key system using blockchain technology, where the user's operational information and metadata information of the file are formed to a block after verified by the checked nodes and then to be put into the blockchain.
References
More filters
ReportDOI

The NIST Definition of Cloud Computing

Peter Mell, +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Journal ArticleDOI

A view of cloud computing

TL;DR: The clouds are clearing the clouds away from the true potential and obstacles posed by this computing capability.
Book ChapterDOI

Identity-Based Encryption from the Weil Pairing

TL;DR: This work proposes a fully functional identity-based encryption scheme (IBE) based on the Weil pairing that has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem.
Book ChapterDOI

Identity-based cryptosystems and signature schemes

TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Journal ArticleDOI

Identity-Based Encryption from the Weil Pairing

TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.
Related Papers (5)