[HTML][HTML] Identity and access management in cloud environment: Mechanisms and challenges

I Indu, PMR Anand, V Bhaskar - Engineering science and technology, an …, 2018 - Elsevier
Cloud computing is a complex system with combination of diverse networked devices that
supports demanded services. The architecture of cloud computing consists of different kinds …

Incentive mechanism of data storage based on blockchain for wireless sensor networks

Y Ren, Y Liu, S Ji, AK Sangaiah… - Mobile Information …, 2018 - Wiley Online Library
In this paper, the blockchain technology is utilized to build the first incentive mechanism of
nodes as per data storage for wireless sensor networks (WSNs). In our system, the nodes …

Lightweight integrity preserving scheme for secure data exchange in cloud-based IoT systems

ZA Hussien, HA Abdulmalik, MA Hussain… - Applied Sciences, 2023 - mdpi.com
The information obtained from external sources within the cloud and the resulting
computations are not always reliable. This is attributed to the absence of tangible …

An efficient data integrity auditing protocol for cloud computing

N Garg, S Bawa, N Kumar - Future Generation Computer Systems, 2020 - Elsevier
Cloud data storage has brought a revolution in Information Technology (IT) sector with its
inherent benefits like ease of use, cost efficiency, location independence etc. By outsourcing …

Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability

P Goswami, N Faujdar, S Debnath, AK Khan… - Journal of Cloud …, 2024 - Springer
Cloud computing provides outsourcing of computing services at a lower cost, making it a
popular choice for many businesses. In recent years, cloud data storage has gained …

IoT data integrity verification for cyber-physical systems using blockchain

C Machado, AAM Fröhlich - 2018 IEEE 21st international …, 2018 - ieeexplore.ieee.org
Blockchain technologies can enable decentralized and trustful features for the Internet of
Things (IoT). Although, existing blockchain based solutions to provide data integrity …

RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing

N Garg, S Bawa - Journal of Network and Computer Applications, 2017 - Elsevier
Cloud computing is a recent phrase in marketing for a concept which has been known for
years: Outsourcing. Cloud computing provides cornucopian of gratuities for both individual …

Effective data storage and dynamic data auditing scheme for providing distributed services in federated cloud

AM Sermakani, D Paulraj - Journal of circuits, Systems and …, 2020 - World Scientific
Recently, many organizations and industries are using the cloud computing technologies for
exchanging the resources and their confidential data. For this purpose, many cloud services …

Distributed data integrity verification scheme in multi-cloud environment

EN Witanto, B Stanley, SG Lee - Sensors, 2023 - mdpi.com
Most existing data integrity auditing protocols in cloud storage rely on proof of probabilistic
data possession. Consequently, the sampling rate of data integrity verification is low to …

Cloud storage data verification using signcryption scheme

EN Witanto, SG Lee - Applied Sciences, 2022 - mdpi.com
Cloud computing brings convenience to the users by providing computational resources and
services. However, it comes with security challenges, such as unreliable cloud service …