From security to assurance in the cloud: A survey

CA Ardagna, R Asal, E Damiani, QH Vu - ACM Computing Surveys …, 2015 - dl.acm.org
The cloud computing paradigm has become a mainstream solution for the deployment of
business processes and applications. In the public cloud vision, infrastructure, platform, and …

Data integrity verification of the outsourced big data in the cloud environment: A survey

L Zhou, A Fu, S Yu, M Su, B Kuang - Journal of Network and Computer …, 2018 - Elsevier
With the explosive growth of data and the rapid development of science technology, big data
analysis has attracted increasing attention. Due to the restrictive performance of traditional …

Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems

Q Zhao, S Chen, Z Liu, T Baker, Y Zhang - Information Processing & …, 2020 - Elsevier
Remote data integrity checking is of great importance to the security of cloud-based
information systems. Previous works generally assume a trusted third party to oversee the …

Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage

Y Yu, MH Au, G Ateniese, X Huang… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Remote data integrity checking (RDIC) enables a data storage server, say a cloud server, to
prove to a verifier that it is actually storing a data owner's data honestly. To date, a number of …

An efficient public auditing protocol with novel dynamic structure for cloud data

J Shen, J Shen, X Chen, X Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
With the rapid development of cloud computing, cloud storage has been accepted by an
increasing number of organizations and individuals, therein serving as a convenient and on …

Fuzzy identity-based data integrity auditing for reliable cloud storage systems

Y Li, Y Yu, G Min, W Susilo, J Ni… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Data integrity, a core security issue in reliable cloud storage, has received much attention.
Data auditing protocols enable a verifier to efficiently check the integrity of the outsourced …

Panda: Public auditing for shared data with efficient user revocation in the cloud

B Wang, B Li, H Li - IEEE Transactions on services computing, 2013 - ieeexplore.ieee.org
With data storage and sharing services in the cloud, users can easily modify and share data
as a group. To ensure shared data integrity can be verified publicly, users in the group need …

Dynamic-hash-table based public auditing for secure cloud storage

H Tian, Y Chen, CC Chang, H Jiang… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
Cloud storage is an increasingly popular application of cloud computing, which can provide
on-demand outsourcing data services for both organizations and individuals. However …

Enabling efficient user revocation in identity-based cloud storage auditing for shared big data

Y Zhang, J Yu, R Hao, C Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Cloud storage auditing schemes for shared data refer to checking the integrity of cloud data
shared by a group of users. User revocation is commonly supported in such schemes, as …

Identity-based distributed provable data possession in multicloud storage

H Wang - IEEE Transactions on Services Computing, 2014 - ieeexplore.ieee.org
Remote data integrity checking is of crucial importance in cloud storage. It can make the
clients verify whether their outsourced data is kept intact without downloading the whole …