Keyword-based remote data integrity auditing supporting full data dynamics

W Shen, C Gai, J Yu, Y Su - IEEE Transactions on Services …, 2023 - ieeexplore.ieee.org
Remote data integrity auditing, as a key technology for cloud storage, allows verifier to check
cloud data integrity without downloading entire file from cloud server (CS). In practice, user …

Certificateless cloud storage auditing supporting data ownership transfer

Y Huang, W Shen, J Qin - Computers & Security, 2024 - Elsevier
Cloud storage auditing allows the data owner/verifier to check whether the cloud correctly
stores data owners' data. In cloud storage auditing scenario, data ownership transfer is a …

An analysis of performance, pricing, and coordination in a supply chain with cloud services: The impact of data security

S Liu, W Han, Z Zhang, FTS Chan - Computers & Industrial Engineering, 2024 - Elsevier
As an important supporting technology for Industry 4.0 and smart manufacturing, cloud
computing technology facilitated the sharing of digital services and reduced energy …

PFDup: Practical Fuzzy Deduplication for Encrypted Multimedia Data

S Cheng, Z Tang, S Zeng, X Cui, T Li - Journal of Industrial Information …, 2024 - Elsevier
Redundant data wastes cloud storage space, especially the multimedia data which
comprises a large number of similar files and accounts for the majority of cloud storage. To …

Secure batch deduplication without dual servers in backup system

H Zheng, S Zeng, H Li, Z Li - IEEE Transactions on Dependable …, 2024 - ieeexplore.ieee.org
Cloud storage provides highly available and low cost resources to users. However, as
massive amounts of outsourced data grow rapidly, an effective data deduplication scheme is …

SDTA: Secure Decentralized Trading Alliance for Electronic Medical Data

X Zhang, Y Su, J Qin, J Sun - The Computer Journal, 2024 - academic.oup.com
Massive medical data are indispensable for training diagnostic models to provide high-
quality health monitoring services. The methods for sharing data in existing works involve …

BCDA: A blockchain-based dynamic auditing scheme for intelligent IoT

Y Liu, S Li, R Kai, C Liu, Y Yu, H Li, M Liu - Computers and Electrical …, 2024 - Elsevier
Abstract Intelligent Internet of Things (IoT) provides services for machine learning
applications by collecting real-time data, where data correctness crucially impacts the …

Efficient Data Sharing Scheme With Fine-Grained Access Control and Integrity Auditing in Terminal-Edge-Cloud Network

Y Yao, J Chang, A Zhang - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
In recent years, terminal-edge-cloud frame-work is very popular since it combines the
storage ability of cloud servers with the advantages of timely response of edge nodes. How …

Role-based Access and Advanced Encryption Techniques Ensure Cloud Data Security in Data Deduplication Schemes

P Swathika, JR Sekar - 2023 7th International Conference on I …, 2023 - ieeexplore.ieee.org
The proliferation of cloud-based storage solutions has accentuated the need for robust
security mechanisms. This research delved into enhancing cloud storage security by …

A Secure Duplicate Data Sharing Method against Untrusted Cloud Service Provider

J Wang, J He, W Li, X Lan, Q Liu… - 2023 IEEE 12th …, 2023 - ieeexplore.ieee.org
Cloud storage allows users to securely store their personal or business data on virtual
server clusters provided by Cloud Service Provider (CSP). However, security risks persist in …