2017 IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2017
DOI: 10.1109/itnec.2017.8284847
|View full text |Cite
|
Sign up to set email alerts
|

Public auditing scheme for cloud data with user revocation and data dynamics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…worst case, but the red-black tree in our scheme only needs three times. As shown in Figure 12, our scheme is obviously more efficient than the scheme [20] and scheme [23] when a large number of insert and delete operations are required. The updated block number for some time(s)…”
Section: Figure 11 the Communication Overhead Of Integrity Verificationmentioning
confidence: 92%
See 4 more Smart Citations
“…worst case, but the red-black tree in our scheme only needs three times. As shown in Figure 12, our scheme is obviously more efficient than the scheme [20] and scheme [23] when a large number of insert and delete operations are required. The updated block number for some time(s)…”
Section: Figure 11 the Communication Overhead Of Integrity Verificationmentioning
confidence: 92%
“…In this section, our scheme is compared with other data integrity verification schemes such as schemes [20,23,31]. Scheme [20] is a dynamic operation scheme based on MHT, scheme [23] is a multi-copy data integrity verification based on spatiotemporal chaos and scheme [31] is a multi-copy data integrity verification based on ID signature. Therefore, it is a good contrast to compare these schemes we chose with our proposed scheme.…”
Section: Efficiency Analysismentioning
confidence: 99%
See 3 more Smart Citations