2021
DOI: 10.1016/j.jksuci.2019.02.011
|View full text |Cite
|
Sign up to set email alerts
|

A secure and efficient remote data auditing scheme for cloud storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…At first, the file (or) data is encrypted using symmetric data encryption key DEK by the owner itself. Then the data is stored in cloud with Access Control List (ACL) [8]. ACL contains the access rights and the names in recipient group who can access the data.…”
Section: Related Workmentioning
confidence: 99%
“…At first, the file (or) data is encrypted using symmetric data encryption key DEK by the owner itself. Then the data is stored in cloud with Access Control List (ACL) [8]. ACL contains the access rights and the names in recipient group who can access the data.…”
Section: Related Workmentioning
confidence: 99%
“…But the limitation of the method is that the keys can be produced according to the attributes of each and every end user. El Ghoubach et al [12] shared the delegation key to TPA for auditing process which was assigned this methodology. These keys are used to generate the identities for the data blocks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The popularity and broad usage of "CLOUD" have facilitated the sharing and collecting of data in several ways [1]- [3]. Not only may people access relevant data more quickly, but sharing data with others has several advantages for our society [4]- [6].…”
Section: Introductionmentioning
confidence: 99%