2019
DOI: 10.1155/2019/1354346
|View full text |Cite
|
Sign up to set email alerts
|

Integrity Audit of Shared Cloud Data with Identity Tracking

Abstract: More and more users are uploading their data to the cloud without storing any copies locally. Under the premise that cloud users cannot fully trust cloud service providers, how to ensure the integrity of users’ shared data in the cloud storage environment is one of the current research hotspots. In this paper, we propose a secure and effective data sharing scheme for dynamic user groups. (1) In order to realize the user identity tracking and the addition and deletion of dynamic group users, we add a new role c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(9 citation statements)
references
References 29 publications
0
9
0
Order By: Relevance
“…e IVC-SelectEncrypt database consists of 8 original images, 200 encrypted images are generated from them using 5 different encrypted algorithms with 5 different encryption degrees. e range of its mean opinion scores (MOS) is [1,5].…”
Section: Security and Communication Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…e IVC-SelectEncrypt database consists of 8 original images, 200 encrypted images are generated from them using 5 different encrypted algorithms with 5 different encryption degrees. e range of its mean opinion scores (MOS) is [1,5].…”
Section: Security and Communication Networkmentioning
confidence: 99%
“…Nowadays, with the widely pervasive usage of interaction devices, such as cameras, cloud storage devices, and the explosive growth of digital images, privacy protection has attracted a lot of attention from researchers [1][2][3][4][5]. Various security schemes, such as digital watermarking [6][7][8], steganography [9], and encryption [10], have been developed to protect copyright, and encryption is the mostly accepted approach which can ensure the security and integrity of data all the time.…”
Section: Introductionmentioning
confidence: 99%
“…Luo et al in 2018 [29] proposed an efficient scheme using BLS short signatures which preserve the user privacy incurring only less computational and communication complexities. A very useful recent research work which involves the verification of the integrity audit of cloud data was proposed by Yan et al in 2019 [30]. is efficient scheme preserves user privacy along with data blindness at a much less computational cost.…”
Section: Literature Surveymentioning
confidence: 99%
“…The size of cloud data is huge, entire file downloading to test out the integrity could be unaffordable in terms of bandwidth cost, and therefore, very unfeasible [6,7]. Furthermore, for data integrity checking conventional cryptographic primitives like authorization code (MAC), hash functions cannot be appropriate at this time directly because of the nonexistence of an original file copy for the verification purpose.…”
Section: …………………………………………………………………………………………………… Introduction:-mentioning
confidence: 99%