2014
DOI: 10.20894/ijmsr.117.006.001.008
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Efficient Audit Service Outsourcing for Data Integrity in Clouds 

Abstract: -Cloud-based outsourced storage relieves the client's load for storage management and maintenance by providing a comparably low-cost, scalable, locationindependent platform. Though, the information that clients no longer have physical control of data specifies that they are facing a potentially formidable risk for missing or corrupted data. To avoid the security risks, inspection services are serious to ensure the integrity and availability of outsourced data and to achieve digital forensics and reliability on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
12
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 27 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…One of the causes is by malicious nodes that perform the common attack called Black Hole attack [9]. A Secure & Efficient Audit Service Outsourcing method designed to prevent the fraudulence of prover [10]. An efficient mechanism on probabilistic queries and periodic verification is proposed to reduce the audit costs per verification and implement abnormal detection timely.…”
Section: Certificate Revocation In Manetmentioning
confidence: 99%
“…One of the causes is by malicious nodes that perform the common attack called Black Hole attack [9]. A Secure & Efficient Audit Service Outsourcing method designed to prevent the fraudulence of prover [10]. An efficient mechanism on probabilistic queries and periodic verification is proposed to reduce the audit costs per verification and implement abnormal detection timely.…”
Section: Certificate Revocation In Manetmentioning
confidence: 99%
“…In segregation, separating arrangement dialect allows the area of FRs as per a differing quality of criteria which does not consider just the consequences of the characterization strategy additionally the dealings of the divider holder with other OSN client's messages on the client profile [7]. In [10] composed new techniques to dodge the security dangers, examination administrations for guaranteeing the respectability and accessibility of outsourced information to pick up accomplish computerized criminology and unwavering quality in a cloud domain.…”
Section: Related Workmentioning
confidence: 99%
“…In each round, various parts of dynamic key are connected to make it hard against cryptanalysis attacks [25]. A Secure & Efficient Audit Service Outsourcing method designed to prevent the fraudulence of prover [26]. An efficient mechanism on probabilistic queries and periodic verification is proposed to reduce the audit costs per verification and implement abnormal detection timely [27].The link level congestion occurs when more than one sensor node tries to acquire the channel at same time.…”
Section: Introductionmentioning
confidence: 99%