• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 260
Next 10 →

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

by Boyang Wang, Baochun Li, Hui Li
"... Abstract—With data storage and sharing services in the cloud, users can easily modify and share data as a group. To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally sig ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
Abstract—With data storage and sharing services in the cloud, users can easily modify and share data as a group. To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally

Public Auditing for Shared Data with Efficient User Revocation in the Cloud

by Boyang Wang, Baochun Li, Hui Li
"... Abstract—With data services in the cloud, users can easily modify and share data as a group. To ensure data integrity can be audited publicly, users need to compute signatures on all the blocks in shared data. Different blocks are signed by different users due to data modifications performed by diff ..."
Abstract - Cited by 18 (2 self) - Add to MetaCart
Abstract—With data services in the cloud, users can easily modify and share data as a group. To ensure data integrity can be audited publicly, users need to compute signatures on all the blocks in shared data. Different blocks are signed by different users due to data modifications performed

A Survey on Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

by Gauri Thorat
"... Abstract — In today's Computing world Cloud computing is one of the biggest innovation which uses advanced computational power and it improves data sharing and data storing capabilities. Main difficulty in cloud computing was issues of data integrity, data privacy and data access by unauthorise ..."
Abstract - Add to MetaCart
inefficacious due to the large size of shared data blocks on cloud. PANDA Plus is the new public auditing mechanism for the maintaining integrity of shared data with efficient user revocation in the cloud. This mechanism is based on proxy re-signatures concept which allows the cloud to re-sign blocks on behalf

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing

by Cong Wang, Qian Wang, Kui Ren, Wenjing Lou - In INFOCOM , 2010
"... Abstract. Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relie ..."
Abstract - Cited by 135 (1 self) - Add to MetaCart
with constrained computing resources and capabilities. Thus, enabling public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. To securely introduce an effective third party auditor (TPA

Integrity Auditing for Outsourced Dynamic Cloud Data with Group User Revocation

by P. Farzana A. Harshavardhan
"... Abstract:- The imminent of the cloud computing makes storage outsourcing turns into a rising pattern, which advances the privacy for remote data auditing an intriguing issue that showed up in the literature. Recently a few researchers consider the issue of secure and productive public data respectab ..."
Abstract - Add to MetaCart
Abstract:- The imminent of the cloud computing makes storage outsourcing turns into a rising pattern, which advances the privacy for remote data auditing an intriguing issue that showed up in the literature. Recently a few researchers consider the issue of secure and productive public data

Privacy-Preserving Public Auditing for Secure Cloud Storage

by Cong Wang, Sherman S.-M. Chow, Qian Wang, Kui Ren, Wenjing Lou , 2009
"... Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession o ..."
Abstract - Cited by 75 (3 self) - Add to MetaCart
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession

A Survey of Privacy Preserving Auditing Techniques for Shared Data in Cloud Computing

by Ridham Kapadiya, Jignesh Prajapati
"... Now a days, cloud computing can be termed as service provider on demand. It has become centralized data storage for the huge amount of data. A user must be concerning about the protection and correctness of his data when he outsources his data to remote data storage as a cloud. Public auditing mecha ..."
Abstract - Add to MetaCart
Now a days, cloud computing can be termed as service provider on demand. It has become centralized data storage for the huge amount of data. A user must be concerning about the protection and correctness of his data when he outsources his data to remote data storage as a cloud. Public auditing

Efficient User Revocation in Dynamic Cloud Using Proxy Server.

by Pocha Nageswara Reddy
"... Abstract:- Cloud provides services like data storage and data sharing in a group. Users can remotely store their data on cloud and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenan ..."
Abstract - Add to MetaCart
Abstract:- Cloud provides services like data storage and data sharing in a group. Users can remotely store their data on cloud and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage

A survey of public auditing for secure data storage in cloud computing,”

by Wei-Fu Hsien , Chou-Chen Yang , Min-Shiang Hwang , Min-Shiang Hwang - International Journal of Network Security, , 2016
"... Abstract Cloud computing has been popular as the IT architecture. Cloud service providers offer many services based on cloud computing. Cloud storage service is the cloud services which can provide a huge storage space to solve the bottleneck of the storage space of local end users. However, cloud ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
storage service may have data security because the users' data is not stored in their own storage. In this paper, we will focus on data integrity in the cloud storage service. Public auditability is a model of outsourcing data integrity verification, which can achieve efficiency and security

Review on Privacy Preserving Public Auditing for Data Sharing on Cloud

by Dipali R Sakhare, Arti Mohanpurkar
"... There numerous data integrity checking techniques have been projected in purpose of privacy preserving cloud data. Most of mechanisms assume that only the data owner can modify data stored on cloud. There are various techniques have been projected intended for data integrity auditing which focuses o ..."
Abstract - Add to MetaCart
on various practical features to have user’s confidence of the integrity of their cloud shares data. To check auditing various features considered like the dynamic data support, public auditing, low communication or computational audit cost, low storage overhead. In recent times a very few attempts consider
Next 10 →
Results 1 - 10 of 260
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University