Добірка наукової літератури з теми "Provable data possession (PDP)"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Provable data possession (PDP)".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Provable data possession (PDP)"
Li, Bin, Chen Lei Cao, Jian Yi Liu, and Jin Xia Wei. "A New Delegation Provable Data Possession in Public Cloud Storage." Applied Mechanics and Materials 644-650 (September 2014): 2239–44. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2239.
Повний текст джерелаJayaraman, Indumathi, and Mokhtar Mohammed. "Secure Privacy Conserving Provable Data Possession (SPC-PDP) framework." Information Systems and e-Business Management 18, no. 3 (August 2, 2019): 351–77. http://dx.doi.org/10.1007/s10257-019-00417-8.
Повний текст джерелаZhou, Fucai, Su Peng, Jian Xu, and Zifeng Xu. "Identity-Based Batch Provable Data Possession with Detailed Analyses." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 743–60. http://dx.doi.org/10.1142/s0129054117400160.
Повний текст джерелаZhou, Caixue. "A Certificate-Based Provable Data Possession Scheme in the Standard Model." Security and Communication Networks 2021 (September 2, 2021): 1–12. http://dx.doi.org/10.1155/2021/9974485.
Повний текст джерелаAlomari, Sara, Mona Alghamdi, and Fahd S. Alotaibi. "Enhancing Big Data Auditing." Computer and Information Science 11, no. 1 (January 27, 2018): 90. http://dx.doi.org/10.5539/cis.v11n1p90.
Повний текст джерелаMathiyalahan, Subasri, Shobana Manivannan, Mahalakshmi Nagasundaram, and R. Ezhilarasie. "Data Integrity Verification Using MPT (Merkle Patricia Tree) in Cloud Computing." International Journal of Engineering & Technology 7, no. 2.24 (April 25, 2018): 500. http://dx.doi.org/10.14419/ijet.v7i2.24.12146.
Повний текст джерелаYan, Hao, Yanan Liu, Zheng Zhang, and Qian Wang. "Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage." Security and Communication Networks 2021 (May 27, 2021): 1–11. http://dx.doi.org/10.1155/2021/6639634.
Повний текст джерелаRani, R. Santha Maria, and Dr Lata Ragha. "Dynamic Public Data Auditing Schemes on Cloud: A Survey." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 1 (January 30, 2018): 76. http://dx.doi.org/10.23956/ijarcsse.v8i1.518.
Повний текст джерелаYang, Hanzhe, Ruidan Su, Pei Huang, Yuhan Bai, Kai Fan, Kan Yang, Hui Li, and Yintang Yang. "PMAB: A Public Mutual Audit Blockchain for Outsourced Data in Cloud Storage." Security and Communication Networks 2021 (June 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/9993855.
Повний текст джерелаTang, Fei, Zhuo Feng, Qianhong Gong, Yonghong Huang, and Dong Huang. "Privacy-Preserving Scheme in the Blockchain Based on Group Signature with Multiple Managers." Security and Communication Networks 2021 (November 24, 2021): 1–8. http://dx.doi.org/10.1155/2021/7094910.
Повний текст джерелаДисертації з теми "Provable data possession (PDP)"
Mohan, Akshaya. "Provable Data Possession Using Sigma Protocols." Thesis, North Dakota State University, 2013. https://hdl.handle.net/10365/27042.
Повний текст джерелаBartlett, Alex Michael. "SoK: A Practical Cost Comparison Among Provable Data Possession Schemes." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1819.
Повний текст джерелаTasi, Meng-Ting, and 蔡孟廷. "Multiple Replica Provable Data Possession Mechanisms in Cloud Computing." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/38442621516959654359.
Повний текст джерела南台科技大學
資訊管理系
100
Recently, the service of data storage in cloud becomes mature. The new model of data storage, however, brings many new information security problems and challenges. For examples, the providers of cloud storage service may base on their own benefits to hide the faults during storing data and do not inform data owners. They may deliberately remove less access data in order to save storage space and cost. They also probably cheat data owners that multiple replicas of the data have been stored, in fact, only one replica is stored. Therefore, the main objective of our research is how to verify the integrity and availability of stored data in cloud computing environment. The thesis first focuses on the security of the static data stored in the cloud storage devices and tries to design secure and efficient provable data possession protocols. It will not restrict the number of verifying data possession, and offer verification to multiple servers at the same time. Furthermore, we consider the dynamic data processing, and also design the dynamic provable data possession protocols in the cloud computing environment. It can achieve the destination of extending the applied environment of the provable data possession protocols.
Chen, Fu-Sheng, and 陳福聖. "Enabling Public Verification of Provable Data Possession with Lightweight Computations." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/28843664970111391619.
Повний текст джерела國立臺灣大學
電機工程學研究所
100
Cloud storage service provider, such as dropbox, let users accessing their data over the network without being limited in certain district. At first we upload our data onto the cloud. When we need the data, we download from the cloud and then notice the data is ruined. Thus, it is convenient for supporting a integrity-checking protocol without retrieving the entire data. In this thesis, we proposed an integrity-checking protocol without retrieving the entire file. This protocol is less time consuming in verification time, enabling public verification, and allowing the modification operation. On the other side, we also notice an attack, Changeling attack, that the service provider might be a chance to forge the integrity. Here, we also have the corresponding countermeasures.
Yang, Cheng-Yu, and 楊誠育. "The Study of Secure Provable-Data-Possession in Cloud Environments." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/wqvuec.
Повний текст джерела國立中央大學
通訊工程學系
106
Cloud computing and cloud storage are important developments because they can be accessed by mobile devices. The outsourced storage in cloud environment has become a stable, location-independent platform for managing user data. However, the outsourced data are not trustworthy because they cannot be accessed locally by users. To resolve the critical issue, many studies have proposed provable-data-possession (PDP) protocol to examine the integrity of outsource data in cloud environments securely and efficiently. This study developed secure PDP protocols based on the bilinear arithmetic of elliptic curves for cloud storage system. This study proposes efficient PDP protocols, which allow the verifier to examine data possession in cloud environments at a lower computational cost. In addition to discussing general certificate, this dissertation presents the first study for achieving authentication by attribute in the storage auditing protocol. For cloud environments without certificate, a new model is proposed to improve security breaches in existing research. In addition, this study provides the PDP protocol in cloud backup environment without certificate to ensure that all the outsourced copies are actually correct. Comparisons with other state-of-the-art schemes show that this study is more secure and efficient.
Chuang, Che-Wei, and 莊哲偉. "A Secure Group Data Access Protocol with Provable Data Possession for Cloud Environment." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/44320104491391635899.
Повний текст джерела國立臺灣科技大學
資訊管理系
102
An increasing number of cloud services, such as Amazon, Yahoo!, Google Drive, Dropbox, and iCloud, provides efficient and scalable data storage services at a considerably lower marginal cost than providers employing traditional ap-proaches. Uses of this type of storage include online data backup, photo sharing, and applications related to email and crucial documents. However, data stored in a cloud are vulnerable to loss, corruption through hardware and software fail-ures, and human errors. Thus, verifying the authenticity of data has emerged as a critical concern regarding data storage on cloud servers. To address the vulnerabilities of cloud-stored data, many approaches have been proposed. However, most of these approaches focus only on the data of indi-vidual users. This study addressed the data of groups and focused on categories that are generally considered crucial: testaments, vital contracts between organizations, and contracts between countries. Thus, to improve the security of cloud-stored group data, a verification protocol for group users based on the short signature protocol developed by Zhang et al. and the authenticated group key agreement protocol developed by Tsai is proposed.
Lin, Chao-Wei, and 林昭瑋. "Enabling Batch Verification for Provable Data Possession on Remote Cloud Storage." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/75178646868214532197.
Повний текст джерела國立臺灣大學
電機工程學研究所
100
When we use various applications of cloud storage services, we may doubt that whether these service providers keep our data safe and sound. It is an important issue because many cloud services provided on the network and people are accustomed to use these applications to share data with friends. If there is no cryptographic protocols and security models applied to those applications, customers can only rely on the service providers to control their outsourced data. Therefore, the data owners need an efficient algorithm or structure which can help them to know whether the integrity of outsourced data is held properly or not. In this thesis, we focus on the integrity issue of outsourced data and batch verification for multiple files in a workspace. We provide an efficient algorithm to check the integrity of a workspace instead of a single file. In addition, we compare the computing time and communication cost between multiple verifications of chosen files in a workspace and our batch verification structure.
Lai, Yi-Chen, and 賴易辰. "Non-repudiable Provable Data Possession Scheme with Designated Verifier in Cloud Storage Systems." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/5ygy6x.
Повний текст джерела國立彰化師範大學
數學系
105
In cloud storage systems, users can upload their data along with associated tag (authentication information) to cloud storage servers. To ensure the availability and integrity of the outsourced data, a provable data possession (PDP) scheme convince verifiers (users or third party) that users’ data stored in the cloud storage server is correct and unchanged. Recently, several PDP schemes with designated verifier (DV-PDP) have been proposed to concern with this issue. A designated verifier (private verifier) is trustable and designated by a user to check the integrity of the outsourced data. However, these DV-PDP schemes are either inefficient or insecure under some circumstances. In this article, we propose the first non-repudiable PDP scheme with designated verifier (DV-NRPDP) to address the non-repudiation issue and resolve the possible disputation between users and the cloud storage server. We first define the new system model, framework and adversary model of DV-NRPDP schemes. Afterwards, a concrete DV-NRPDP scheme is presented. Based on the computing discrete logarithm (DL) assumption, we formally prove that the proposed DV-NRPDP scheme is secure against several forgery attacks in the random oracle model. Comparisons with the previously proposed schemes are given to demonstrate the advantages of our scheme.
Liu, Cheng-Wei, and 劉正偉. "Dynamic and Efficient Provable Data Possession for Electronic Health Record System &; Symmetric Searchable Encryption Implementation." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/35316429617917002288.
Повний текст джерела國立交通大學
資訊科學與工程研究所
101
We propose a data integrity check scheme for electronic health record system. In our scheme, the patient can check the integrity of his health records when he finished uploading his health records. Obviously, our scheme is based on HMAC, so the computing time of the proof and the verification in our scheme is short. Our scheme also allows the patient to modify his health records on the server. In the end, we design a testing EHR system which allows the patient to check the correctness of his health records. We consider that the user may outsource his files to the server. To protect the confidentiality of his files, the user will outsource his files with encrypted form. As a result, the user can’t search over the encrypted files easily. Searchable symmetric encryption (SSE) allows the user to outsource the storage of his data to the server in a private manner, while maintaining the ability to selectively search over it. We build a keyword-searching system based on SSE scheme. Our system also allows the user to download the encrypted files associated with the search result. Last, we analyze the performance of our system.
Частини книг з теми "Provable data possession (PDP)"
Zhou, Fucai, Su Peng, Jian Xu, and Zifeng Xu. "Identity-Based Batch Provable Data Possession." In Provable Security, 112–29. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47422-9_7.
Повний текст джерелаYu, Yong, Yafang Zhang, Yi Mu, Willy Susilo, and Hongyu Liu. "Provably Secure Identity Based Provable Data Possession." In Provable Security, 310–25. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26059-4_17.
Повний текст джерелаLi, Changfeng, and Huaqun Wang. "Efficient Dynamic Provable Data Possession from Dynamic Binary Tree." In Provable Security, 101–11. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47422-9_6.
Повний текст джерелаFeng, Chao, Honghong Wang, Wenbo Wan, Qinghua Li, and Fangzhou Xu. "Robust/Recover Provable Data Possession Protocol." In Security with Intelligent Computing and Big-data Services, 574–87. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16946-6_46.
Повний текст джерелаKadvani, Smit, Aditya Patel, Mansi Tilala, Priteshkumar Prajapati, and Parth Shah. "Provable Data Possession Using Identity-Based Encryption." In Information and Communication Technology for Intelligent Systems, 87–94. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1742-2_9.
Повний текст джерелаTian, Jun-Feng, Rui-Fang Guo, and Xuan Jing. "A Non-repudiable Dynamic Provable Data Possession." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 723–30. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21373-2_61.
Повний текст джерелаLiu, Yudong, Xu An Wang, Yunfei Cao, Dianhua Tang, and Xiaoyuan Yang. "Improved Provable Data Transfer from Provable Data Possession and Deletion in Cloud Storage." In Advances in Intelligent Networking and Collaborative Systems, 445–52. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98557-2_40.
Повний текст джерелаLin, Changlu, Fucai Luo, Jinglong Luo, and Yali Liu. "An Identity-Set-Based Provable Data Possession Scheme." In Security with Intelligent Computing and Big-data Services, 606–18. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16946-6_49.
Повний текст джерелаEtemad, Mohammad, and Alptekin Küpçü. "Transparent, Distributed, and Replicated Dynamic Provable Data Possession." In Applied Cryptography and Network Security, 1–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38980-1_1.
Повний текст джерелаLin, Changlu, Fucai Luo, Huaxiong Wang, and Yan Zhu. "A Provable Data Possession Scheme with Data Hierarchy in Cloud." In Information Security and Cryptology, 301–21. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-38898-4_18.
Повний текст джерелаТези доповідей конференцій з теми "Provable data possession (PDP)"
Curtmola, Reza, Osama Khan, Randal Burns, and Giuseppe Ateniese. "MR-PDP: Multiple-Replica Provable Data Possession." In 2008 28th IEEE International Conference on Distributed Computing Systems (ICDCS). IEEE, 2008. http://dx.doi.org/10.1109/icdcs.2008.68.
Повний текст джерелаXiaojun Yu and Qiaoyan Wen. "MF-PDP: Multi-function provable data possession scheme in cloud computing." In 2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems (CCIS). IEEE, 2014. http://dx.doi.org/10.1109/ccis.2014.7175805.
Повний текст джерелаLimin Li, Yahui Yang, and Zhonghai Wu. "FMR-PDP: Flexible multiple-replica provable data possession in cloud storage." In 2017 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2017. http://dx.doi.org/10.1109/iscc.2017.8024675.
Повний текст джерелаMasood, Raziqa, Nitin Pandey, and Q. P. Rana. "DHT-PDP: A Distributed Hash Table based Provable Data Possession Mechanism in Cloud Storage." In 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2020. http://dx.doi.org/10.1109/icrito48877.2020.9198019.
Повний текст джерелаErway, Chris, Alptekin Küpçü, Charalampos Papamanthou, and Roberto Tamassia. "Dynamic provable data possession." In the 16th ACM conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1653662.1653688.
Повний текст джерелаChen, Bo, and Reza Curtmola. "Robust Dynamic Provable Data Possession." In 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops). IEEE, 2012. http://dx.doi.org/10.1109/icdcsw.2012.57.
Повний текст джерелаMohan, Akshaya, and Rajendra Katti. "Provable Data Possession Using Sigma-protocols." In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2012. http://dx.doi.org/10.1109/trustcom.2012.227.
Повний текст джерелаAteniese, Giuseppe, Roberto Di Pietro, Luigi V. Mancini, and Gene Tsudik. "Scalable and efficient provable data possession." In the 4th international conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1460877.1460889.
Повний текст джерелаAteniese, Giuseppe, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. "Provable data possession at untrusted stores." In the 14th ACM conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1315245.1315318.
Повний текст джерелаLiu, Feifei, Dawu Gu, and Haining Lu. "An improved dynamic provable data possession model." In 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS). IEEE, 2011. http://dx.doi.org/10.1109/ccis.2011.6045077.
Повний текст джерела