2020
DOI: 10.1016/j.ins.2020.03.057
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-enhanced remote data integrity checking with updatable timestamp

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 10 publications
0
11
0
Order By: Relevance
“…Due to the inherent risks of CSP, several TPA-based schemes are proposed to verify that the CSP is honestly providing services [13], [19], [30]. Wang et al [13] presented a method for public audibility in which the TPA is used to verify the integrity of the data stored in the cloud.…”
Section: B Data Verificationmentioning
confidence: 99%
See 2 more Smart Citations
“…Due to the inherent risks of CSP, several TPA-based schemes are proposed to verify that the CSP is honestly providing services [13], [19], [30]. Wang et al [13] presented a method for public audibility in which the TPA is used to verify the integrity of the data stored in the cloud.…”
Section: B Data Verificationmentioning
confidence: 99%
“…In the approach of [30], a privacyaware public audit mechanism is proposed by constructing a homomorphic verifiable group signature. Moreover, the content and timestamp are allowed timestamp verification during data integrity checks in [19]. However, if the TPA is compromised, the verification service may be disrupted.…”
Section: B Data Verificationmentioning
confidence: 99%
See 1 more Smart Citation
“…Tong et al [15] devised a technique that delivers indistinguishable privacy (IND-privacy) as compared to TPA for both data content and timestamp It build the authenticator with the randomizable structure-preserving signature to connect the content and timestamp in the authenticator and allow efficient timestamp updating (SPS). Furthermore, in the auditing phase, they use the Groth-Sahai proof and range proof to offer IND-privacy and ensure timestamp validity.…”
Section: IImentioning
confidence: 99%
“…e storage services developed to collect the outsourced data reduce their services greatly that affects the local storage essentialities of users. e integrity of data while verifying it is considered as a significant challenge in case of cloud computing [1,2]. e data offloading and downloading, on the contrary, are often considered as a major consideration for testing the integrity of outsourced data, and this will increase dramatically the processing and connection overhead.…”
Section: Introductionmentioning
confidence: 99%