2014
DOI: 10.1049/iet-ifs.2012.0271
|View full text |Cite
|
Sign up to set email alerts
|

Identity‐based remote data possession checking in public clouds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
103
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 147 publications
(110 citation statements)
references
References 26 publications
0
103
0
Order By: Relevance
“…Latest work was proposed by Wang H. which was an ID based RDPC approach for multi cloud storage [1]. In 2007, provable data possession (PDP) paradigm was proposed by Ateniese et al [2], where the verifier can check remote data integrity with a high probability. Based on the RSA technique, they provided two provably secure PDP schemes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Latest work was proposed by Wang H. which was an ID based RDPC approach for multi cloud storage [1]. In 2007, provable data possession (PDP) paradigm was proposed by Ateniese et al [2], where the verifier can check remote data integrity with a high probability. Based on the RSA technique, they provided two provably secure PDP schemes.…”
Section: Related Workmentioning
confidence: 99%
“…The total communication is about (16)*n+255+c bits where n is number of blocks requested, in this approach we are assuming single query submission. The scheme [2] gives considerable performance but causes additional cost c for client request initiation and major communication overhead due to client reference. If client needs to generate challenges with small durations, the constant value grows rapidly.…”
Section: System Performance Analysismentioning
confidence: 99%
“…So, it is clear that the auditing schemes on the ID-based cryptography system will reduce the costs of the data users and the auditor. Many ID-based public auditing schemes are proposed [20][21][22][23]. But, in ID-based public auditing schemes, the PKG (private key generator) knows any user's private key.…”
Section: Introductionmentioning
confidence: 99%
“…This lack of control for privacy data would exhibit data confidentiality and privacy protection problem. For the CSP, some errors may occur, such as software or hardware failures and operational errors of system administrator [2][3][4][5]. For maintaining the CSP's reputation, he/she usually tries to hide data loss incidents.…”
Section: Introductionmentioning
confidence: 99%