2020
DOI: 10.1109/tifs.2020.2986879
|View full text |Cite
|
Sign up to set email alerts
|

An Adaptive Authenticated Data Structure With Privacy-Preserving for Big Data Stream in Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 47 publications
(22 citation statements)
references
References 40 publications
0
22
0
Order By: Relevance
“…In addition, the recent big data stream growth, which transfers huge quantities of data between thousands of servers [8,9], makes it more complicated for the spoofed address verification. us, how to ensure the integrity of big data streams in SDN-based data center networks without affecting normal communications SDNbased networks has taken a crucial role when performing policy-based communications in the SDN-based data center networks [10].…”
Section: Introductionmentioning
confidence: 99%
“…In addition, the recent big data stream growth, which transfers huge quantities of data between thousands of servers [8,9], makes it more complicated for the spoofed address verification. us, how to ensure the integrity of big data streams in SDN-based data center networks without affecting normal communications SDNbased networks has taken a crucial role when performing policy-based communications in the SDN-based data center networks [10].…”
Section: Introductionmentioning
confidence: 99%
“…While supporting dynamic data operations, privacy protection issues still need to be considered. Sun et al [27] proposed a privacy protection method in the cloud big data streaming environment. However, Li et al [28] proved that the scheme could not resist the untrusted CSP.…”
Section: B Related Workmentioning
confidence: 99%
“…It means [92] shows that Privacy-Preserving public auditing protocol proposed by Liu et al [93] for regenerating-code-based cloud storage is not secure since the proxy delegated by data owner can forge authenticators for any data block. Li et al [94] commented on data auditing system called P-ATHAT proposed by Sun et al [95]. P-ATHAT consists of two schemes: Tree-based private auditing: User need to download the entire data to audit the data integrity.…”
Section: ) Lightweight and Privacy_preserving Public Auditing Using Iomentioning
confidence: 99%