2017
DOI: 10.1007/s10586-017-1486-z
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and secure auditing scheme for privacy preserving data storage in cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 16 publications
0
10
0
Order By: Relevance
“…Another privacy-preserving auditing approach is proposed by Anbuchelian et al [66]. The purpose of this method is to ensure that the TPA is denied from accessing the contents of the audited data.…”
Section: Privacy-preserving Public Auditing (Pppas)mentioning
confidence: 99%
“…Another privacy-preserving auditing approach is proposed by Anbuchelian et al [66]. The purpose of this method is to ensure that the TPA is denied from accessing the contents of the audited data.…”
Section: Privacy-preserving Public Auditing (Pppas)mentioning
confidence: 99%
“…Several recent researches in the respective area are studied in this section. S. Anbuchelian, et al [14] presented a secure cryptographic hash algorithm used to encrypt the data and split the data into many chunks of files. The method developed a new algorithm known as Modified RSA Cryptosystem (MRSAC), which was an enhancement of RSA key generation algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…The TPA auditing technique is used effectively to guarantee the DI and data encryption system is used in the TPA to secure the data. Recent method involves in the TPA aried [11][12][13][14][15] in this section to analyze its performance. Anbuchelian, et al [11] established secure cryptography hashing algorithm in the TPA to improve the security.…”
Section: Related Workmentioning
confidence: 99%
“…Recent method involves in the TPA aried [11][12][13][14][15] in this section to analyze its performance. Anbuchelian, et al [11] established secure cryptography hashing algorithm in the TPA to improve the security. After uploading the data, the user was provided with a private and public key for trustworthy retrieval of the data file, where modified RSA algorithm was used to generate these keys.…”
Section: Related Workmentioning
confidence: 99%