2020
DOI: 10.1007/978-981-15-8101-4_1
|View full text |Cite
|
Sign up to set email alerts
|

Security Protocol for Cloud Storage Based on Block-Chain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…In Benil and Jasper, 19 efficient Elliptical Curve Certificate less Aggregate Cryptography Signature scheme (EC-ACS) was presented toward public auditing and verification to perform data encryption. In Hajizadeh and Navimipour, 20 Lv, 21 Mayuranathan et al, 22 and Medhane et al, 23 presents a behavior analysis graph model with blockchain for the evaluation of trust over the service providers of a cloud environment. Similarly, in Singh et al, 24 Bin Abd Rahman et al, 25 and Landahl et al, 26 a multivariate correlation analysis scheme was presented to ensure the security of data in the cloud with a blockchain which analyses the network traffic.…”
Section: Related Workmentioning
confidence: 99%
“…In Benil and Jasper, 19 efficient Elliptical Curve Certificate less Aggregate Cryptography Signature scheme (EC-ACS) was presented toward public auditing and verification to perform data encryption. In Hajizadeh and Navimipour, 20 Lv, 21 Mayuranathan et al, 22 and Medhane et al, 23 presents a behavior analysis graph model with blockchain for the evaluation of trust over the service providers of a cloud environment. Similarly, in Singh et al, 24 Bin Abd Rahman et al, 25 and Landahl et al, 26 a multivariate correlation analysis scheme was presented to ensure the security of data in the cloud with a blockchain which analyses the network traffic.…”
Section: Related Workmentioning
confidence: 99%