2020
DOI: 10.1109/tsc.2017.2708116
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 53 publications
(16 citation statements)
references
References 21 publications
0
16
0
Order By: Relevance
“…MSHT was originally designed by Miao et al in 2018 [40], which could be regarded as a development of the traditional MHT [41]. Similar to MHT, MSHT can also verify the data integrity of any subset [42].…”
Section: Preliminariesmentioning
confidence: 99%
“…MSHT was originally designed by Miao et al in 2018 [40], which could be regarded as a development of the traditional MHT [41]. Similar to MHT, MSHT can also verify the data integrity of any subset [42].…”
Section: Preliminariesmentioning
confidence: 99%
“…In recent years, more and more researchers have conducted further research on multi-replica storage, 11,12 and the dynamic operation of outsourced data. 13 In 2020, Rao et al 14 proposed a dynamic audit scheme. It adopts a new Merkle hash tree (MHT) method based on batch leaf authentication to process multiple leaf nodes and their indexes.…”
Section: Related Workmentioning
confidence: 99%
“…In their scheme, sensitive information is protected while other information is not affected. Rao et al [29] presented a new approach, based on batch-leaves-authenticated Merkle hash tree, to batch-verify multiple leaf nodes and their own indexes altogether.…”
Section: Related Workmentioning
confidence: 99%
“…Performance Analysis. In this section, we analyse the computation and memory overhead, and we make a brief comparison with Rao's [29].…”
Section: □ Lemma 3 Csp and Tpa Cannot Conduct Collusion Attacksmentioning
confidence: 99%