مشخصات مقاله | |
انتشار | مقاله سال 2018 |
تعداد صفحات مقاله انگلیسی | 35 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
منتشر شده در | نشریه الزویر |
نوع مقاله | ISI |
عنوان انگلیسی مقاله | Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing |
ترجمه عنوان مقاله | حسابرسی کارآمد برای داده های به اشتراک گذاشته شده در ابر با لغو امنیت کاربر و محاسبات برون سپاری |
فرمت مقاله انگلیسی | |
رشته های مرتبط | کامپیوتر |
گرایش های مرتبط | رایانش ابری |
مجله | کامپیوترها و امنیت – Computers & Security |
دانشگاه | College of Computer – National University of Defense Technology – Changsha – China |
کلمات کلیدی | ذخیره سازی ابر، حسابرسی عمومی، لغو کاربر، برون سپاری، محیط متحرک |
کد محصول | E5608 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
بخشی از متن مقاله: |
1. Introduction
Cloud storage is one of the most crucial services of cloud computing, which provides users with elastic storage space. Users are allowed to modify and share their outsourced data in the cloud anywhere and anytime [1]. However, data security has become a critical problem that prevents this new paradigm of data hosting service from widespread adoptions. One of the biggest concerns of the data security is the integrity of the outsourced data in the cloud. Although the cloud storage providers commit a reliable and secure storage service to users, the integrity of outsourced can still be corrupted due to carelessness of humans or failures of hardware/software [2, 3]. Besides internal threats, external adversaries may also destroy the integrity of the outsourced data in the cloud. Therefore, public integrity auditing is needed to convince the users that the outsourced data is correctly stored in the cloud. To ensure the integrity of outsourced data in an untrustable cloud, a number of protocols have been proposed based on various techniques [4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16]. In all these protocols, the data owner computes a signature on each block of the data and outsources the data together with the corresponding signatures to the cloud, which allows not only the data owner, but also a third party auditor (TPA) to check the integrity of data in the cloud without downloading the entire outsourced data. However, most of the previous works only consider the case of personal data, which means that there is only one modifier, namely the data owner, who holds the secret key and can modify the data. |