2018
DOI: 10.1016/j.cose.2017.12.004
|View full text |Cite
|
Sign up to set email alerts
|

Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 37 publications
(19 citation statements)
references
References 9 publications
0
19
0
Order By: Relevance
“…The overall evaluation of the research work is implemented in the cloud simualitn and client access control is performed efficiently. Luo et al [41] proposed a novel open inspecting plan for the honesty of imparted information to proficient conspiracy safe client renouncement. Furthermore, we stretch out the proposed plan to help safely signature and confirmation re-appropriating, which permit more productivity for gathering clients and the examiner.…”
Section: Discussion Of Different Dynamic Grouping Techniquesmentioning
confidence: 99%
“…The overall evaluation of the research work is implemented in the cloud simualitn and client access control is performed efficiently. Luo et al [41] proposed a novel open inspecting plan for the honesty of imparted information to proficient conspiracy safe client renouncement. Furthermore, we stretch out the proposed plan to help safely signature and confirmation re-appropriating, which permit more productivity for gathering clients and the examiner.…”
Section: Discussion Of Different Dynamic Grouping Techniquesmentioning
confidence: 99%
“…We also note that in SMC, no trusted third party is needed for secure computation. This kind of technology has been widely used in many secure outsourced computation areas [31,40,41]. Recently, SMC and homomorphic cryptosystem [23] have been adopted to build privacy-preserving data mining classifiers [15,20,42].…”
Section: Related Workmentioning
confidence: 99%
“…A number of protocols designed to verify the data integrity in the cloud and various techniques used for auditing. In all these protocols, the data owner computes a signature on each block of the data and outsources the data together with the corresponding signatures to the cloud [8]. A typical third-party auditing scheme includes three parties such as the data owner who outsources its data and signatures into the data center [9].…”
Section: Introductionmentioning
confidence: 99%