2022
DOI: 10.1007/s11042-022-13089-3
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic proof of retrievability based on public auditing for coded secure cloud storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…In addition, a rank‐based MHT (rMHT) was implemented for conducting verifiable dynamic operations for data to handle replay attacks and replace attacks. In 2022, Asimi et al 25 exhibited an effective public auditing strategy to ensure the privacy‐preservation of data together with “Proof‐of‐Retrievability (PoR)”. They have consisted of guaranteeing the outsourced data file integrity of users through conducting several functionalities like (a) Acquiring low‐computational cost with dynamic data processing, (b) Data recovery, with the ability to identify the tempering or intact of stored data for challenging the Prover (CSP), (c) creation of signatures with “Boneh–Lynn–Shacham (BLS)‐Homomorphic Verifiable Tag (HVT)” for ensuring the integrity level, and (d) utilization of Goppa codes generator matrix for encoding outsourced file.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, a rank‐based MHT (rMHT) was implemented for conducting verifiable dynamic operations for data to handle replay attacks and replace attacks. In 2022, Asimi et al 25 exhibited an effective public auditing strategy to ensure the privacy‐preservation of data together with “Proof‐of‐Retrievability (PoR)”. They have consisted of guaranteeing the outsourced data file integrity of users through conducting several functionalities like (a) Acquiring low‐computational cost with dynamic data processing, (b) Data recovery, with the ability to identify the tempering or intact of stored data for challenging the Prover (CSP), (c) creation of signatures with “Boneh–Lynn–Shacham (BLS)‐Homomorphic Verifiable Tag (HVT)” for ensuring the integrity level, and (d) utilization of Goppa codes generator matrix for encoding outsourced file.…”
Section: Literature Surveymentioning
confidence: 99%
“…The rMHT 24 can have a provable security system that reduces the flaws in cloud security effectively but lots of trained data is required. The BLS‐HVT 25 ensures the integrity of users' un‐sourced data files but the data may corrupt due to its large size and less storage space.…”
Section: Literature Surveymentioning
confidence: 99%