Jiaoli Shi

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
—Cloud storage enables users to remotely store their data and share the data through the cloud. Existing integrity auditing schemes for shared data are often not identity-preserving and have high auditing cost, and hence are still far from practical application. In this work, we propose a public auditing scheme for shared data in cloud storage with identity(More)
Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes offers a new mechanism for exploiting the mobile devices that many users already carry. However, forwarding messages in such a network is trapped by many particular challenges, and some protocols have contributed to solve them partly. In this(More)
Storage auditing and client-side deduplication techniques have been proposed to assure data integrity and improve storage efficiency, respectively. Recently, a few schemes start to consider these two different aspects together. However, these schemes either only support plaintext data file or have been proved insecure. In this paper, we propose a public(More)
  • 1