2013
DOI: 10.1007/s11859-013-0926-8
|View full text |Cite
|
Sign up to set email alerts
|

Towards comprehensive provable data possession in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…The generalization experiments were conducted on the public datasets, namely the HRC_WHU and SPARCS datasets, to prove the generalizability and validity of our model. The lab from Wuhan University offered the HRC WHU dataset [55]. The dataset contains 150 high-resolution images from around the world, with resolutions ranging from 0.5 to 15 m. The images come from Google Earth, and only clouds were labelled.…”
Section: Experimental Datasetsmentioning
confidence: 99%
“…The generalization experiments were conducted on the public datasets, namely the HRC_WHU and SPARCS datasets, to prove the generalizability and validity of our model. The lab from Wuhan University offered the HRC WHU dataset [55]. The dataset contains 150 high-resolution images from around the world, with resolutions ranging from 0.5 to 15 m. The images come from Google Earth, and only clouds were labelled.…”
Section: Experimental Datasetsmentioning
confidence: 99%
“…Several studies [68][69][70][71] introduced privacy protection protocols to determine the privacy leakage issues. In [69], the researchers designed a zero-knowledge proof-based privacypreserving scheme with publicly provable data.…”
Section: State-of-the-art Data Integrity Auditng Techniquesmentioning
confidence: 99%
“…The TPA performs the auditing without fetching the data copy, resultant, privacy is maintained [12].Li and his colleagues has put forth a feasible method of verifiable data ownership which utilizes a sequence number (SN)-chunk number (BN) vector for assisting data block change. The method is made successful using decreased estimation, stockpiling/data storage and communication overhead [13] [17].Ni and his colleagues presents a security-assurance checking rule related to the dispersed stockpiling as analysed. It's possible for the dynamic attacker to modify the proof of checking processso as to mislead the verifier and acquire the information, resultant, the cloud records that are inaccessible are not corrupted, though the reports are deteriorated [14] [18].…”
Section: Related Workmentioning
confidence: 99%