Data outsourcing authentication model based on authenticated data structures for cloud computing
The outsourcing authentication model based on authenticated data structures was proposed.The formal defini-tion,data query authentication protocol and data updating authentication protocol of the model was presented.The crucial problems when the authenticated data structures are being used were anal...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2011-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74419316/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537127785955328 |
---|---|
author | XU Jian1 ZHOU Fu-cai1 CHEN Xu1 ZHU Zhi-liang2 |
author_facet | XU Jian1 ZHOU Fu-cai1 CHEN Xu1 ZHU Zhi-liang2 |
author_sort | XU Jian1 |
collection | DOAJ |
description | The outsourcing authentication model based on authenticated data structures was proposed.The formal defini-tion,data query authentication protocol and data updating authentication protocol of the model was presented.The crucial problems when the authenticated data structures are being used were analyzed.With designing the new extended coher-ence proof generation algorithm and the new extended verifying algorithm,authenticated data structures in the model very well was used.Finally the model with others through the performance analysis including the security and efficiency,the results of which show that:the model is more efficient than others as well as the consistency and correctness require-ments are also guaranteed. |
format | Article |
id | doaj-art-c7f79ecd1ae8432ab40861a55e447a45 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2011-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-c7f79ecd1ae8432ab40861a55e447a452025-01-14T08:45:58ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2011-01-013215316074419316Data outsourcing authentication model based on authenticated data structures for cloud computingXU Jian1ZHOU Fu-cai1CHEN Xu1ZHU Zhi-liang2The outsourcing authentication model based on authenticated data structures was proposed.The formal defini-tion,data query authentication protocol and data updating authentication protocol of the model was presented.The crucial problems when the authenticated data structures are being used were analyzed.With designing the new extended coher-ence proof generation algorithm and the new extended verifying algorithm,authenticated data structures in the model very well was used.Finally the model with others through the performance analysis including the security and efficiency,the results of which show that:the model is more efficient than others as well as the consistency and correctness require-ments are also guaranteed.http://www.joconline.com.cn/zh/article/74419316/cloud computingauthenticated data structuresdata outsourcingauthenticated skip list |
spellingShingle | XU Jian1 ZHOU Fu-cai1 CHEN Xu1 ZHU Zhi-liang2 Data outsourcing authentication model based on authenticated data structures for cloud computing Tongxin xuebao cloud computing authenticated data structures data outsourcing authenticated skip list |
title | Data outsourcing authentication model based on authenticated data structures for cloud computing |
title_full | Data outsourcing authentication model based on authenticated data structures for cloud computing |
title_fullStr | Data outsourcing authentication model based on authenticated data structures for cloud computing |
title_full_unstemmed | Data outsourcing authentication model based on authenticated data structures for cloud computing |
title_short | Data outsourcing authentication model based on authenticated data structures for cloud computing |
title_sort | data outsourcing authentication model based on authenticated data structures for cloud computing |
topic | cloud computing authenticated data structures data outsourcing authenticated skip list |
url | http://www.joconline.com.cn/zh/article/74419316/ |
work_keys_str_mv | AT xujian1 dataoutsourcingauthenticationmodelbasedonauthenticateddatastructuresforcloudcomputing AT zhoufucai1 dataoutsourcingauthenticationmodelbasedonauthenticateddatastructuresforcloudcomputing AT chenxu1 dataoutsourcingauthenticationmodelbasedonauthenticateddatastructuresforcloudcomputing AT zhuzhiliang2 dataoutsourcingauthenticationmodelbasedonauthenticateddatastructuresforcloudcomputing |