Proof of storage with corruption identification and recovery for dynamic group users
The outsourced storage mode of cloud computing leads to the separation of data ownership and management rights of data owners, which changes the data storage network model and security model.To effectively deal with the software and hardware failures of the cloud server and the potential dishonest s...
Saved in:
| Main Authors: | Tao JIANG, Hang XU, Liangmin WANG, Jianfeng MA |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
POSTS&TELECOM PRESS Co., LTD
2022-10-01
|
| Series: | 网络与信息安全学报 |
| Subjects: | |
| Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022071 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Application of The Burden and Standard of Proof in Corruption Allegations Under ICSID Arbitration
by: Metincan Kaban
Published: (2022-06-01) -
nPPoS: Non-interactive practical proof-of-storage for blockchain
by: Jun Wook Heo, et al.
Published: (2024-12-01) -
User‐side cloud energy storage configuration and operation optimization considering time‐of‐use pricing and state‐of‐charge management
by: Yongji Ma, et al.
Published: (2025-04-01) -
New method for file deduplication in cloud storage
by: Chao YANG, et al.
Published: (2017-03-01) -
New method for file deduplication in cloud storage
by: Chao YANG, et al.
Published: (2017-03-01)