2018
DOI: 10.1109/tdsc.2018.2829880
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Efficient User Revocation in Identity-based Cloud Storage Auditing for Shared Big Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

2
86
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 120 publications
(88 citation statements)
references
References 36 publications
2
86
0
Order By: Relevance
“…In order to achieve efficient user revocation, Wang et al [33] designed a shared data integrity auditing scheme supporting user revocation by making use of the proxy re-signature. Based on the identity-based setting, Zhang et al [34] constructed a cloud storage auditing scheme for shared data supporting real efficient user revocation. To realize the data sharing with sensitive information hiding, Shen et al [35] designed an identity-based cloud storage auditing scheme for shared data.…”
Section: A Related Workmentioning
confidence: 99%
“…In order to achieve efficient user revocation, Wang et al [33] designed a shared data integrity auditing scheme supporting user revocation by making use of the proxy re-signature. Based on the identity-based setting, Zhang et al [34] constructed a cloud storage auditing scheme for shared data supporting real efficient user revocation. To realize the data sharing with sensitive information hiding, Shen et al [35] designed an identity-based cloud storage auditing scheme for shared data.…”
Section: A Related Workmentioning
confidence: 99%
“…However, when the user is revoked, the cloud server is allowed to replace the previously signed data block of the revoked user to a legal group instead of the group member, which can cause efficiency problem. In addition, in scheme [8], the authors propose to enable efficient user revocation in identity-based cloud storage auditing for shared big data. On the other hand, Yu et al [8,9] proposed the issue of key security among cloud users.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, in scheme [8], the authors propose to enable efficient user revocation in identity-based cloud storage auditing for shared big data. On the other hand, Yu et al [8,9] proposed the issue of key security among cloud users. In these schemes, the key exposure in one time period does not affect the security of cloud storage auditing in other time periods and verifiable out-sourcing of key updates.…”
Section: Related Workmentioning
confidence: 99%
“…The TPA auditing technique is used effectively to guarantee the DI and data encryption system is used in the TPA to secure the data. Recent method involves in the TPA aried [11][12][13][14][15] in this section to analyze its performance. Anbuchelian, et al [11] established secure cryptography hashing algorithm in the TPA to improve the security.…”
Section: Related Workmentioning
confidence: 99%