Auditing cache data integrity in the edge computing environment

B Li, Q He, F Chen, H Jin, Y Xiang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Edge computing allows app vendors to deploy their applications and relevant data on
distributed edge servers to serve nearby users. Caching data on edge servers can minimize …

Efficient certificateless multi-copy integrity auditing scheme supporting data dynamics

L Zhou, A Fu, G Yang, H Wang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
To improve data availability and durability, cloud users would like to store multiple copies of
their original files at servers. The multi-copy auditing technique is proposed to provide users …

PPADT: privacy-preserving identity-based public auditing with efficient data transfer for cloud-based IoT data

C Gai, W Shen, M Yang, J Yu - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Public auditing is a significant technique in cloud-based Internet of Things (IoT) systems,
which enables the verifier to check the integrity of IoT data stored in the cloud. Nowadays …

An efficient privacy-preserving public auditing protocol for cloud-based medical storage system

X Li, S Liu, R Lu, MK Khan, K Gu… - IEEE Journal of …, 2022 - ieeexplore.ieee.org
The booming Internet of Things makes smart healthcare a reality, while cloud-based medical
storage systems solve the problems of large-scale storage and real-time access of medical …

Efficient data integrity auditing supporting provable data update for secure cloud storage

C Yang, B Song, Y Ding, J Ou… - … and Mobile Computing, 2022 - Wiley Online Library
Cloud storage, an economically attractive service offered by cloud service providers (CSPs),
has attracted a large number of tenants. However, because the ownership and management …

Conditional anonymous certificateless public auditing scheme supporting data dynamics for cloud storage systems

X Zhang, X Wang, D Gu, J Xue… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Cloud computing provides users with convenient data storage services, which
simultaneously poses various security concerns, the integrity of outsourced data has been …

Provable data deletion from efficient data integrity auditing and insertion in cloud storage

C Yang, Y Liu, F Zhao, S Zhang - Computer Standards & Interfaces, 2022 - Elsevier
With the widespread popularity of cloud storage, a growing number of data owners are
willing to outsource their massive data to remote cloud servers, thus effectively avoiding the …

CIA: A collaborative integrity auditing scheme for cloud data with multi-replica on multi-cloud storage providers

T Li, J Chu, L Hu - IEEE Transactions on Parallel and …, 2022 - ieeexplore.ieee.org
The emergence of cloud storage has solved many pain points of the traditional storage
model. However, the issue of cloud storage data integrity-whether the cloud storage provider …

Generic dynamic data outsourcing framework for integrity verification

M Etemad, A Küpçü - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Ateniese et al. proposed the Provable Data Possession (PDP) model in 2007. Following
that, Erway et al. adapted the model for dynamically updatable data and called it the …

A certificateless provable data possession scheme for cloud-based EHRs

J Shen, P Zeng, KKR Choo, C Li - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Electronic health records (EHRs: digital collections of patient health status and diagnosis)
are generally shared, analyzed and stored on cloud servers. One operational challenge is to …