Articles with "auditing protocol" as a keyword



Photo by lukaszlada from unsplash

ID-Based Public Auditing Protocol for Cloud Storage Data Integrity Checking with Strengthened Authentication and Security

Sign Up to like & get
recommendations!
Published in 2018 at "Wuhan University Journal of Natural Sciences"

DOI: 10.1007/s11859-018-1335-9

Abstract: Cloud storage service reduces the burden of data users by storing users’ data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity… read more here.

Keywords: public auditing; cloud storage; security; protocol ... See more keywords
Photo from wikipedia

A Public Auditing Protocol for Cloud Storage System With Intrusion-Resilience

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2019.2923238

Abstract: Cloud storage auditing helps users to check the integrity of their data stored on the cloud. However, if the client's auditing secret key is exposed to the malicious cloud, the client's data may be deleted… read more here.

Keywords: auditing protocol; public auditing; intrusion resilience; protocol ... See more keywords