Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
Citations
1,783 citations
1,255 citations
Cites background from "Privacy-Preserving Public Auditing ..."
...In [105] the authors ensure the data content through another privacypreserving public auditing system....
[...]
1,217 citations
Cites background from "Privacy-Preserving Public Auditing ..."
...Privacy-preserving techniques have been proposed in many scenarios including cloud [48, 4], smart grid [40], wireless network [39] , and online social network [35]....
[...]
1,008 citations
982 citations
References
6,590 citations
3,697 citations
"Privacy-Preserving Public Auditing ..." refers methods in this paper
...A bilinear map is a map e : G1 × G2 → GT with the following properties [15, 16 ]: 1) Computable: there exists an efficiently computable algorithm for computing e; 2) Bilinear: for all u ∈ G1, v ∈ G2 and a,b ∈ Zp, e(ua,vb) = e(u,v)ab; 3)...
[...]
2,869 citations
"Privacy-Preserving Public Auditing ..." refers methods in this paper
...Following the same technique of Schnorr signature [22], our auditing protocol between TPA and cloud server can be regarded as a provably secure honest zero knowledge identification scheme [23], by viewing μ as a secret key and γ as a challenge value, which implies no information on μ can be leaked....
[...]
2,127 citations
2,016 citations