2012
DOI: 10.15373/22501991/feb2013/44
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preserving and Public Auditing Service for Data Storage in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Allows data power, but does not guarantee that data stored in the cloud is secure. To establish data integrity through TPA, Tejaswini et al [10] they rented a Merkle hash tree. Rivest, a Shamir Adleman (RSA)-based cryptographic system, maintains data confidentiality, while Jadhav et al [11] created an offensive module that constantly monitors data changes in the cloud.…”
Section: Introductionmentioning
confidence: 99%
“…Allows data power, but does not guarantee that data stored in the cloud is secure. To establish data integrity through TPA, Tejaswini et al [10] they rented a Merkle hash tree. Rivest, a Shamir Adleman (RSA)-based cryptographic system, maintains data confidentiality, while Jadhav et al [11] created an offensive module that constantly monitors data changes in the cloud.…”
Section: Introductionmentioning
confidence: 99%
“…Most existing solutions (e.g., [13][14][15][16]) employ encryption/ decryption techniques combined with access control and auditing system to provide security and privacy for data stored on a public cloud. Different approaches are used to outsource health care data.…”
Section: Introductionmentioning
confidence: 99%