2014
DOI: 10.1109/tpds.2013.164
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
44
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 75 publications
(44 citation statements)
references
References 20 publications
0
44
0
Order By: Relevance
“…The auditing schemes in [7], [8] imply the problem that users need to always stay online for the owner, which may impede its adoption in practice, especially for long-term archival storage. Also the owner may not be technological efficient and can detect, locate the faulty server.…”
Section: Problem Statementmentioning
confidence: 99%
“…The auditing schemes in [7], [8] imply the problem that users need to always stay online for the owner, which may impede its adoption in practice, especially for long-term archival storage. Also the owner may not be technological efficient and can detect, locate the faulty server.…”
Section: Problem Statementmentioning
confidence: 99%
“…In [10] make great effort to design auditing schemes for regenerating-code-based cloud storage, which is similar to our contribution except that ours release the data owner from online burden for verification and regeneration. Furthermore, in [11] proposed an efficient construction of cooperative provable data possession (CPDP) which can be used in multi-clouds, and [12] extend their primitive auditing protocol to support batch auditing for both multiple owners and multiple clouds.…”
Section: Literature Surveymentioning
confidence: 99%
“…Similar studies areperformed by Bo subgenus Chen et al [7] and H. Chen el al. [8] one by one and severally. [7] Extended the single-server CPOR scheme (private version in [10]) to the regeneratingcode-scenario; [8] designed and enforced an information integrity protection (DIP) theme for FMSR [11]-based cloud storage and therefore the theme is customized to the thin-cloud setting1.…”
Section: Introductionmentioning
confidence: 97%
“…[8] one by one and severally. [7] Extended the single-server CPOR scheme (private version in [10]) to the regeneratingcode-scenario; [8] designed and enforced an information integrity protection (DIP) theme for FMSR [11]-based cloud storage and therefore the theme is customized to the thin-cloud setting1. However,both of them are designed for personal audit, solely the information owner is allowed to verify the integrity and repair the faulty servers.…”
Section: Introductionmentioning
confidence: 97%