2015 IEEE Trustcom/BigDataSE/Ispa 2015
DOI: 10.1109/trustcom.2015.404
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(13 citation statements)
references
References 24 publications
0
13
0
Order By: Relevance
“…InPrivacypreserving public auditing for shared cloud data supporting group dynamics [10], proposed an auditing scheme that provides data privacy and supports dynamic groups in the cloud. Another auditing scheme,Efficientintegrity auditing for shared data in the cloud with Secure User Revocation [12]that supports revocation of the user from the group.An Efficient Public Batch Auditing Protocol for Data Security in Multi-cloud Storage [13], to perform multiple audits task simultaneously and supports multi cloud data.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…InPrivacypreserving public auditing for shared cloud data supporting group dynamics [10], proposed an auditing scheme that provides data privacy and supports dynamic groups in the cloud. Another auditing scheme,Efficientintegrity auditing for shared data in the cloud with Secure User Revocation [12]that supports revocation of the user from the group.An Efficient Public Batch Auditing Protocol for Data Security in Multi-cloud Storage [13], to perform multiple audits task simultaneously and supports multi cloud data.…”
Section: Related Workmentioning
confidence: 99%
“…One of the users in the group may misbehave or exit from the group then revokes the user from the group.The proposed system introduces a public auditing mechanism [9] for shared data in the cloud.In this scheme a third party auditor for shared data in the cloud, a digital signature is used to verify the integrity of shared data without retrieving the whole data.The system model also manage the revocation of users [12] in the group.…”
Section: Introductionmentioning
confidence: 99%
“…For user revocation and efficient integrity checking, a public integrity checking scheme utilizing polynomialbasedauthentication tags, which is collusion-resistant and of a constant computational cost on the user side [5]. The Shamir Secret Sharing, splits the re-signing process into a number of parts and deploy them to different proxies.…”
Section: Integrity Auditing Of Shared Datawith Secure User Revocationmentioning
confidence: 99%
“…For Data integrity various encryption algorithms are used like an RSA algorithms [1] , message digest 5 algorithms [4] , Shamir secret sharing [5] which helps for dynamic user revocation for protecting integrity of file.…”
Section: Comparison Analysis 31 Encryption Techniquementioning
confidence: 99%
See 1 more Smart Citation