Articles with "storage auditing" as a keyword



Photo by alterego_swiss from unsplash

Identity-Based Cloud Storage Auditing for Data Sharing With Access Control of Sensitive Information

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3121678

Abstract: Remote data integrity auditing ensures the integrity of cloud storage. In practice, cloud users may not want their sensitive data to be exposed to others. Thus, it is meaningful to investigate how to realize data… read more here.

Keywords: sensitive information; access; storage auditing; cloud storage ... See more keywords
Photo by lukaszlada from unsplash

Toward Usable Cloud Storage Auditing, Revisited

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2021.3055021

Abstract: In recent years, how to design secure and efficient cloud storage auditing (CSA) protocols, which enable users to verify whether the cloud server still keeps their stored data undamaged, is a research hotspot, and many… read more here.

Keywords: usable cloud; toward usable; cloud storage; auditing revisited ... See more keywords
Photo by priscilladupreez from unsplash

Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2018.2829880

Abstract: Cloud storage auditing schemes for shared data refer to checking the integrity of cloud data shared by a group of users. User revocation is commonly supported in such schemes, as users may be subject to… read more here.

Keywords: user revocation; storage auditing; revoked user; revocation ... See more keywords