Proof of storage with corruption identification and recovery for dynamic group users
The outsourced storage mode of cloud computing leads to the separation of data ownership and management rights of data owners, which changes the data storage network model and security model.To effectively deal with the software and hardware failures of the cloud server and the potential dishonest s...
Main Author: | Tao JIANG, Hang XU, Liangmin WANG, Jianfeng MA |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2022-10-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | https://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2022071 |
Similar Items
-
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
by: Paterson Maura B., et al.
Published: (2013-10-01) -
Multi-prover proof of retrievability
by: Paterson Maura B., et al.
Published: (2018-12-01) -
Efficient Group Proof of Storage With Malicious-Member Distinction and Revocation
by: Liehuang Zhu, et al.
Published: (2019-01-01) -
Oort: User-Centric Cloud Storage with Global Queries
by: Chajed, Tej, et al.
Published: (2016) -
Hy-SAIL: Hyper-Scalability, Availability and Integrity Layer for Cloud Storage Systems
by: Dino Macedo Amaral, et al.
Published: (2019-01-01)