Articles with "merkle tree" as a keyword



Photo from wikipedia

A position-aware Merkle tree for dynamic cloud data integrity verification

Sign Up to like & get
recommendations!
Published in 2017 at "Soft Computing"

DOI: 10.1007/s00500-015-1918-8

Abstract: In the cloud storage framework, once clients remotely store their data on cloud storage providers, they will lose the physical control over their outsourced data. The risk of unauthorized access to the data increases dramatically.… read more here.

Keywords: aware merkle; storage; position; cloud data ... See more keywords
Photo from wikipedia

Blockchain based privacy preserving multimedia intelligent video surveillance using secure Merkle tree

Sign Up to like & get
recommendations!
Published in 2020 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-020-08776-y

Abstract: The recent intelligent surveillance systems provide various services that have not existed before, such as proactive predictive surveillance, through the AI-based video analysis technology. However, there are common security and privacy challenges caused by malicious… read more here.

Keywords: video; blockchain based; merkle tree; surveillance ... See more keywords
Photo by emben from unsplash

Toward a Green Blockchain: Engineering Merkle Tree and Proof of Work for Energy Optimization

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Network and Service Management"

DOI: 10.1109/tnsm.2022.3219494

Abstract: Blockchain-powered smart systems deployed in different industrial applications promise operational efficiencies and improved yields, while significantly mitigating cybersecurity risks. Tradeoffs between availability and security arise at implementation, however, triggered by the additional resources (e.g., memory… read more here.

Keywords: blockchain; energy; merkle tree; proof work ... See more keywords
Photo from wikipedia

User Verifiable Multiple Keyword Search Scheme using the Merkle Tree for Outsourced Data in the Cloud

Sign Up to like & get
recommendations!
Published in 2017 at "International Journal of Technology"

DOI: 10.14716/ijtech.v8i4.9475

Abstract: Cloud computing has revolutionized the IT industry by offering huge storage for data outsourcing and also for computation. Various security issues concerned with security and privacy of data arise in the context of data outsourcing.… read more here.

Keywords: search; security; scheme; keyword search ... See more keywords
Photo from wikipedia

An Image Authentication Scheme Using Merkle Tree Mechanisms

Sign Up to like & get
recommendations!
Published in 2019 at "Future Internet"

DOI: 10.3390/fi11070149

Abstract: Research on digital image processing has become quite popular and rapid in recent years, and scholars have proposed various image verification mechanisms. Similarly , blockchain technology has also become very popular in recent years. This… read more here.

Keywords: method; image verification; image; mechanism ... See more keywords