Online/Offline Provable Data Possession

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

1 Dynamic Provable Data Possession

As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has received increased attention. In the provable data possession (PDP) model, the client preprocesses the data and then sends it to an untrusted server for storage, while keeping a small amount of meta-data. The client later ask...

متن کامل

Robust Provable Data Possession Protocol

Provable data possession (PDP) is a technique for ensuring the validity of data in storage outsourcing. The main issue is how to frequently, efficiently verify that an untrusted server is correctly storing its client’s outsourced data. In this paper, we introduce a robust provable data possession protocol that allows a client that has stored he/her data at an untrusted server to verify the vali...

متن کامل

Provable Dynamic Data Possession by Datalog Rules

In recent years, the concept of data outsourcing has become quite popular. With the appearance of Cloud Computing, there is a new paradigm: Cloud Storage. Cloud Storage means that the data owner moves its data to a Cloud Storage Server that is supposed to faithfully store the data and make it available to the data owner and perhaps the data requestors. This paper discusses how to guarantee the ...

متن کامل

A Generic Dynamic Provable Data Possession Framework

Ateniese et al. introduced the Provable Data Possession (PDP) model in 2007. Following that, Erway et al. adapted the model for dynamically updatable data, and called it the Dynamic Provable Data Possession (DPDP) model. The idea is that a client outsources her files to a server, and later on challenges the server to obtain a proof that her data is kept intact. During recent years, many schemes...

متن کامل

Delegable Provable Data Possession for Remote Data in the Clouds

Many storage systems need to do authorized verification for data integrity. For example, a user stores his data into cloud storage servers and shares his data with his friends. They check data integrity periodically to ensure data intact. However, they don’t want a stranger to check data integrity on their data. Therefore, public verification is undesired in this situation. The user can share h...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2017

ISSN: 1556-6013,1556-6021

DOI: 10.1109/tifs.2017.2656461