Data Integrity Audit Scheme Based on Quad Merkle Tree and Blockchain
نویسندگان
چکیده
Cloud storage is an essential method for data storage. Verifying the integrity of in cloud critical client. Traditional approaches rely on third-party auditors (TPAs) to accomplish auditing tasks. However, are often not trusted. To eliminate over-reliance auditors, this paper designs a blockchain-based scheme that uses blockchain instead ensure reliability auditing. Meanwhile, our based audit quad Merkle hash tree, using root tree verify data, which significantly improves computing and efficiency. Automated verification activities by deploying smart contracts allows us have more up-to-date picture integrity. The performance evaluated through security analysis experiments, prove proposed secure effective.
منابع مشابه
Merkle Hash Tree based Techniques for Data Integrity of Outsourced Data
One of the problems associated with outsourcing data to cloud service providers is the data integrity of outsourced data. In this paper we present data integrity techniques for the outsourced data. Data integrity encompasses the completeness, correctness and freshness of the data. This paper focuses on the Merkle Hash Tree based data integrity techniques. It also presents the techniques for sto...
متن کاملMerkle Tree Traversal Revisited
We propose a new algorithm for computing authentication paths in the Merkle signature scheme. Compared to the best algorithm for this task, our algorithm reduces the worst case running time considerably.
متن کاملMedical Image Registration Based on BSP and Quad-Tree Partitioning
This paper presents a study of image simplification techniques as a first stage to define a multiresolution registration framework. We propose here a new approach for image registration based on the partitioning of the source images in binary-space (BSP) and quad-tree structures. These partitioned images have been obtained with a maximum mutual information gain algorithm. Multimodal registratio...
متن کاملBlockchain Enabled Privacy Audit Logs
Privacy audit logs are used to capture the actions of participants in a data sharing environment in order for auditors to check compliance with privacy policies. However, collusion may occur between the auditors and participants to obfuscate actions that should be recorded in the audit logs. In this paper, we propose a Linked Data based method of utilizing blockchain technology to create tamper...
متن کاملAn Optimal Quad-Tree-Based Motion Estimator
In this paper we propose an optimal quad tree QT based motion estimator for video compression It is optimal in the sense that for a given bit budget for encoding the displacement vector eld DVF and the QT segmentation the scheme nds a DVF and a QT segmentation which minimizes the energy of the resulting displaced frame di erence DFD We nd the optimal QT decomposition and the optimal DVF jointly...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2023.3240066