A survey on proof of retrievability for cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and future trends

CB Tan, MHA Hijazi, Y Lim, A Gani - Journal of Network and Computer …, 2018 - Elsevier
Cloud storage has emerged as the latest trend for data storage over the traditional storage
method which consume more storage spaces of data owner resources for backup and …

Privacy preservation models for third-party auditor over cloud computing: A survey

A Razaque, MBH Frej, B Alotaibi, M Alotaibi - Electronics, 2021 - mdpi.com
Cloud computing has become a prominent technology due to its important utility service; this
service concentrates on outsourcing data to organizations and individual consumers. Cloud …

DeyPoS: Deduplicatable dynamic proof of storage for multi-user environments

K He, J Chen, R Du, Q Wu, G Xue… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Dynamic Proof of Storage (PoS) is a useful cryptographic primitive that enables a user to
check the integrity of outsourced files and to efficiently update the files in a cloud server …

Data is the new oil–sort of: a view on why this comparison is misleading and its implications for modern data administration

C Stach - Future Internet, 2023 - mdpi.com
Currently, data are often referred to as the oil of the 21st century. This comparison is not only
used to express that the resource data are just as important for the fourth industrial …

Edge data integrity verification scheme supporting data dynamics and batch auditing

Y Ding, Y Li, W Yang, K Zhang - Journal of Systems Architecture, 2022 - Elsevier
With the rapid development of 5G technology and wireless networks, new applications such
as VR/AR-based immersive online games have developed rapidly. These applications are …

Clustering-based data integrity verification approach for multi-replica in a fog environment

KU Maheswari, SMS Bhanu, N Savarimuthu - The Journal of …, 2024 - Springer
Due to dynamic changes, applications designed for the Internet of Things (IoT) require new
storage resources. Storing IoT data in a fog infrastructure is a common practice to guarantee …

Secure and efficient proof of ownership for deduplicated cloud storage

J Dave, P Faruki, V Laxmi, B Bezawada… - Proceedings of the 10th …, 2017 - dl.acm.org
The rapid increment in volume of outsourced data has raised an issue of data management
for Cloud Storage Server. To solve this issue, Deduplication, a data compression technique …

Secure proof of ownership using merkle tree for deduplicated storage

J Dave, A Dutta, P Faruki, V Laxmi, MS Gaur - Automatic Control and …, 2020 - Springer
In cloud services, deduplication is a widely used data reduction technique to minimize
storage and communication overhead. Nonetheless, deduplication introduces a serious …

Block-Level Message-Locked Encryption with Polynomial Commitment for IoT Data.

K Huang, XS Zhang, XF Wang - Journal of Information …, 2017 - search.ebscohost.com
The promise of smart city leads to store massive sensitive IoT data in cloud storage from
various sources. Storage burden and security concerns are the most challenging issues …

HSA-EDI: An Efficient One-Round Integrity Verification for Mobile Edge Caching Using Hierarchical Signature Aggregation

J Li, Q Zhao, S Teng, N Wu, G Li… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Mobile edge computing allows for high-performance and low-latency applications by
delegating computation and data processing tasks to edge servers. However, ensuring the …