Storing Shared Data on the Cloud via Security-Mediator

@article{Wang2013StoringSD,
  title={Storing Shared Data on the Cloud via Security-Mediator},
  author={Boyang Wang and Sherman S. M. Chow and Ming Li and Hui Li},
  journal={2013 IEEE 33rd International Conference on Distributed Computing Systems},
  year={2013},
  pages={124-133}
}
Nowadays, many organizations outsource data storage to the cloud such that a member (owner) of an organization can easily share data with other members (users). Due to the existence of security concerns in the cloud, both owners and users are suggested to verify the integrity of cloud data with Provable Data Possession (PDP) before further utilization on data. However, previous methods either unnecessarily reveal the identity of a data owner to the untrusted cloud or any public verifiers, or… CONTINUE READING
Highly Cited
This paper has 96 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 67 extracted citations

Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability

Journal of Systems and Software • 2016
View 9 Excerpts
Highly Influenced

Threshold privacy-preserving cloud auditing with multiple uploaders

International Journal of Information Security • 2018
View 1 Excerpt

Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds

IEEE Transactions on Information Forensics and Security • 2017
View 2 Excerpts

Online/Offline Provable Data Possession

IEEE Transactions on Information Forensics and Security • 2017
View 2 Excerpts

Public Auditing Scheme of Dynamic Data Sharing Suiting for Cloud-Based EHR System

2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC) • 2017
View 1 Excerpt

96 Citations

02040'13'15'17'19
Citations per Year
Semantic Scholar estimates that this publication has 96 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 24 references

Compact Proofs of Retrievability

ASIACRYPT • 2008
View 9 Excerpts
Highly Influenced

Oruta : Privacy-Preserving Public Auditing for Shared Data in the Cloud

Nalla Karthik Reddy
2015
View 10 Excerpts
Highly Influenced

Provable data possession at untrusted stores

ACM Conference on Computer and Communications Security • 2007
View 7 Excerpts
Highly Influenced

Tor: The Second-Generation Onion Router

USENIX Security Symposium • 2004
View 4 Excerpts
Highly Influenced

Privacy-Preserving Public Auditing For Secure Cloud Storage

Salve Bhagyashri, Prof. Y. B. Gurav
2014
View 6 Excerpts
Highly Influenced

Enabling Public Verifiability and Data Dynamics for Storage Security

IACR Cryptology ePrint Archive • 2009
View 4 Excerpts
Highly Influenced

Short Signatures from the Weil Pairing

ASIACRYPT • 2001
View 5 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…