2016
DOI: 10.1002/cpe.3883
|View full text |Cite
|
Sign up to set email alerts
|

Integrity as a service for replicated data on the cloud

Abstract: Summary With the proliferation of cloud storage services, data integrity verification becomes increasingly significant in order to guarantee the availability and correctness of the outsourced data. Recently, many auditing schemes have been proposed to verify data integrity without possessing or downloading the outsourced data files. However, such schemes in existence assume that there is a single data owner that can update the file and compute the integrity tags. They do not consider the efficiency of user rev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 54 publications
0
7
0
Order By: Relevance
“…A qualitative comparison between the proposed scheme and existing multi‐replica dynamic schemes is shown in Table . As seen, the work of Barsoum and Hasan and the proposed scheme are far more efficient than the works of Wang et al and Abo‐alian et al considering the storage and communication costs. In the work of Barsoum and Hasan and our scheme, the storage overhead is independent of the number of replicas n .…”
Section: Discussionmentioning
confidence: 79%
See 2 more Smart Citations
“…A qualitative comparison between the proposed scheme and existing multi‐replica dynamic schemes is shown in Table . As seen, the work of Barsoum and Hasan and the proposed scheme are far more efficient than the works of Wang et al and Abo‐alian et al considering the storage and communication costs. In the work of Barsoum and Hasan and our scheme, the storage overhead is independent of the number of replicas n .…”
Section: Discussionmentioning
confidence: 79%
“…Moreover, transferring AAI from the CSP to the TPA during verification is eliminated. This is because the work of Barsoum and Hasan and our scheme adopt the MVT, while the works of Wang et al and Abo‐alian et al utilize the MHT and skip lists, respectively. Different from the work of Barsoum and Hasan, the proposed scheme introduces ID‐based signature (IBS) and proposes a fine‐grained dynamic update mechanism.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The replica storage, Curtmola et al [39] also created a tag for data blocks similarly ( ) , wherein denotes the j-th data block of i-th copy. Currently several solutions that adapted RSA method just change the hash function, such as [40] and [41].…”
Section: ) Rsa-based Homomorphic Methodsmentioning
confidence: 99%
“…Using ECCs can work only on a specified number of losses, and, if it goes beyond this number, the original data cannot be recovered. Therefore, Liu et al [ 22 ], Abo-alian et al [ 23 , 24 ], and Curtmola et al [ 25 ] use another approach, i.e. The user uploads multiple replicas for his file to the PCS, and the TPA can check the integrity of all these replicas (data replication).…”
Section: Related Work Critical Analysismentioning
confidence: 99%