搜索结果: 1-15 共查到“军队指挥学 auditing”相关记录15条 . 查询时间(0.062 秒)
zkLedger: Privacy-Preserving Auditing for Distributed Ledgers
auditing distributed ledgers zero-knowledge proofs
2018/3/9
Distributed ledgers (e.g. blockchains) enable financial institutions to efficiently reconcile cross-organization transactions. For example, banks might use a distributed ledger as a settlement log for...
On the Security of a Lightweight Cloud Data Auditing Scheme
Cloud storage public auditing privacy preserving
2017/11/10
In cloud storage service, public auditing mechanisms allow a third party to verify integrity of the outsourced data on behalf of data users without the need to retrieve data from the cloud server. Rec...
CoRPA: A Novel Efficient Shared Data Auditing Protocol in Cloud Storage
Cloud storage shared data public auditing, identity privacy
2017/9/28
As data sharing has become one of the most popular features offered by cloud storage services, designing public auditing mechanisms for integrity of shared data stored at the cloud becomes much more i...
Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing
Secure Client-Side Deduplication Public auditing Privacy
2016/7/14
Existing cloud storage systems receive the data in its plain form and perform conventional (server-side) deduplication mechanisms. However, disclosing the data to the cloud can potentially threaten th...
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations
unconditional hidingness auditable multi-party computations cloud computing
2016/6/3
In this work an unconditionally hiding auditing procedure for computations on documents stored in distributed fashion is introduced. There is only one multi-party computation (MPC) scheme providing au...
MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud
public auditing integrity verification cloud computing
2016/1/9
Big data and its applications are attracting more and more research interests in recent years. As the new generation distributed computing platform, cloud computing is believed to be the most potent p...
Privacy-Preserving Auditing for Attribute-Based Credentials
privacy-enhancing credentials data minimization auditing
2016/1/9
Privacy-enhancing attribute-based credentials (PABCs) allow
users to authenticate to verifiers in a data-minimizing way, in the
sense that users are unlinkable between authentications and only discl...
Crypto-analyses on “secure and efficient privacy-preserving public auditing scheme for cloud storage”
privacy-preserving auditing cloud storage bilinear pairing
2016/1/7
Recently, Worku et al. pointed out that the work “privacy-preserving public auditing for data storage security in cloud computing” proposed by Wang et al. is insecure and their second work “privacy- p...
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud
Attribute-Based Encryption Ciphertext-Policy Key Abuse
2015/12/29
As a sophisticated mechanism for secure fine-grained access
control, ciphertext-policy attribute-based encryption (CP-ABE) is a
highly promising solution for commercial applications such as cloud co...
An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme
Data storage public auditability privacy preserving
2015/12/29
One of the most important benefits of public cloud storage
is outsourcing of management and maintenance with easy accessibility
and retrievability over the internet. However, outsourcing data on the...
Multi-file proofs of retrievability for cloud storage auditing
Cloud storage Storage service provider
2014/3/12
Cloud storage allows clients to store a large amount of data with the help of storage service providers (SSPs). Proof-of-retrievability(POR) protocols allow one server to prove to a verifier the avail...
Secure and Constant Cost Public Cloud Storage Auditing with Deduplication
Secure Cloud Storage Public Auditing Secure Storage Deduplication Constant Cost
2013/4/18
Data integrity and storage efficiency are two important requirements for cloud storage. Proof of Retrievability (POR) and Proof of Data Possession (PDP) techniques assure data integrity for cloud stor...
Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage
Authentication Proof of Retrievability Secure Cloud Storage
2011/7/25
In cloud storage service, users upload their data together with authentication information to cloud storage server.
Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage
cryptographic protocols / Authentication Proof of Retrievability Secure Cloud Storage Secure Delegation of Auditing
2012/3/28
In cloud storage service, users upload their data together with authentication information to cloud storage server. To ensure the availability and integrity of users' data stored in the cloud storage,...
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
Privacy-Preserving Public Auditing Data Storage Security Cloud Computing
2009/12/29
Cloud Computing is the long dreamed vision of computing as a utility, where
users can remotely store their data into the cloud so as to enjoy the on-demand high quality
applications and services fro...