2018
DOI: 10.1155/2018/3205898
|View full text |Cite
|
Sign up to set email alerts
|

ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification

Abstract: With the rapid development of cloud service, people with limited storage space can store their data files to the cloud and delete the file in their memory. However, the cloud service provider may change or partly delete user’s file for his benefit. Therefore, it is necessary for the user to periodically check the data file integrity. Public auditing protocols are just designated for checking the data file integrity by an auditor on behalf of the user. Recently, based on ID-based cryptography many ID-based publ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…The algorithm uses various cryptographic hashing algorithms to ensure data integrity. Kang [4] et al proposed a new ID-based public auditing protocol to detect the integrity of cloud data. The protocol allows for optimized structure, privacy protection and effective aggregation verification functions.…”
Section: Introductionmentioning
confidence: 99%
“…The algorithm uses various cryptographic hashing algorithms to ensure data integrity. Kang [4] et al proposed a new ID-based public auditing protocol to detect the integrity of cloud data. The protocol allows for optimized structure, privacy protection and effective aggregation verification functions.…”
Section: Introductionmentioning
confidence: 99%