Security and privacy in cloud computing: technical review

YS Abdulsalam, M Hedabou - Future Internet, 2021 - mdpi.com
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …

Ensuring security and privacy preservation for cloud data services

J Tang, Y Cui, Q Li, K Ren, J Liu, R Buyya - ACM Computing Surveys …, 2016 - dl.acm.org
With the rapid development of cloud computing, more and more enterprises/individuals are
starting to outsource local data to the cloud servers. However, under open networks and not …

Blockchain based data integrity service framework for IoT data

B Liu, XL Yu, S Chen, X Xu… - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
It is a challenge to ensure data integrity for cloud-based Internet of Things (IoT) applications
because of the inherently dynamic nature of IoT data. The available frameworks of data …

Auditing cache data integrity in the edge computing environment

B Li, Q He, F Chen, H Jin, Y Xiang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Edge computing allows app vendors to deploy their applications and relevant data on
distributed edge servers to serve nearby users. Caching data on edge servers can minimize …

Privacy-preserving public auditing for secure cloud storage

C Wang, SSM Chow, Q Wang, K Ren… - IEEE transactions on …, 2011 - ieeexplore.ieee.org
Using cloud storage, users can remotely store their data and enjoy the on-demand high-
quality applications and services from a shared pool of configurable computing resources …

Privacy-preserving public auditing for data storage security in cloud computing

C Wang, Q Wang, K Ren, W Lou - 2010 proceedings ieee …, 2010 - ieeexplore.ieee.org
Cloud Computing is the long dreamed vision of computing as a utility, where users can
remotely store their data into the cloud so as to enjoy the on-demand high quality …

Toward secure and dependable storage services in cloud computing

C Wang, Q Wang, K Ren, N Cao… - IEEE transactions on …, 2011 - ieeexplore.ieee.org
Cloud storage enables users to remotely store their data and enjoy the on-demand high
quality cloud applications without the burden of local hardware and software management …

Dynamic provable data possession

CC Erway, A Küpçü, C Papamanthou… - ACM Transactions on …, 2015 - dl.acm.org
As storage-outsourcing services and resource-sharing networks have become popular, the
problem of efficiently proving the integrity of data stored at untrusted servers has received …

Scalable and efficient provable data possession

G Ateniese, R Di Pietro, LV Mancini… - Proceedings of the 4th …, 2008 - dl.acm.org
Storage outsourcing is a rising trend which prompts a number of interesting security issues,
many of which have been extensively investigated in the past. However, Provable Data …

HAIL: A high-availability and integrity layer for cloud storage

KD Bowers, A Juels, A Oprea - Proceedings of the 16th ACM conference …, 2009 - dl.acm.org
We introduce HAIL (High-Availability and Integrity Layer), a distributed cryptographic system
that allows a set of servers to prove to a client that a stored file is intact and retrievable. HAIL …