2020
DOI: 10.1007/978-3-030-60248-2_5
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle Tree

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 19 publications
0
13
0
Order By: Relevance
“…Moreover, users may already remove the original data from their local storage because it is already stored in CSPs. A major problem with loss of data possession is that CSPs can hide mistakes they made from users for their benefit [ 5 , 6 ]. Besides, CSPs may face internal or external security problems such as accidentally corrupting or eliminating rarely accessed users’ data to reduce storage burden and claims that all data are still stored within the cloud and internal software bugs [ 3 ].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, users may already remove the original data from their local storage because it is already stored in CSPs. A major problem with loss of data possession is that CSPs can hide mistakes they made from users for their benefit [ 5 , 6 ]. Besides, CSPs may face internal or external security problems such as accidentally corrupting or eliminating rarely accessed users’ data to reduce storage burden and claims that all data are still stored within the cloud and internal software bugs [ 3 ].…”
Section: Introductionmentioning
confidence: 99%
“…Besides, CSPs may face internal or external security problems such as accidentally corrupting or eliminating rarely accessed users’ data to reduce storage burden and claims that all data are still stored within the cloud and internal software bugs [ 3 ]. In another case, data integrity is at risk if a bad actor successfully compromises the CSPs’ systems [ 3 , 4 , 5 , 6 , 7 ].…”
Section: Introductionmentioning
confidence: 99%
“…Part of this work has previously appeared as an extended version in a conference [32]. We revise and extend the work mainly from five aspects compared with [32].…”
Section: Blockchain-based Data Integrity Verificationmentioning
confidence: 99%
“…Part of this work has previously appeared as an extended version in a conference [32]. We revise and extend the work mainly from five aspects compared with [32]. First, we analyze the impact of data dynamic operations on the blockchain-based system and extend our scheme to dispose of secure data dynamic operations.…”
Section: Blockchain-based Data Integrity Verificationmentioning
confidence: 99%
“…Despite the great success of cloud storage, it also faces various challenges [2]- [4], and its security, reliability and privacy have always been a serious issue [6], [7]. After the user stores the data on the cloud server, the server provider may damage or delete the user data due to various factors [12], verifying the integrity of outsourced data becomes a crucial issue in cloud storage.…”
Section: Introductionmentioning
confidence: 99%