Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Tytuł pozycji:

An effective, secure and efficient tagging method for integrity protection of outsourced data in a public cloud storage.

Tytuł:
An effective, secure and efficient tagging method for integrity protection of outsourced data in a public cloud storage.
Autorzy:
ALmarwani R; College of Computer Science and Engineering (CCSE), Taibah University, Medina, Saudi Arabia.; Information Management Research Group, The Department of Computer Science, The University of Manchester, Manchester, United Kingdom.
Zhang N; Information Management Research Group, The Department of Computer Science, The University of Manchester, Manchester, United Kingdom.
Garside J; Information Management Research Group, The Department of Computer Science, The University of Manchester, Manchester, United Kingdom.
Źródło:
PloS one [PLoS One] 2020 Nov 05; Vol. 15 (11), pp. e0241236. Date of Electronic Publication: 2020 Nov 05 (Print Publication: 2020).
Typ publikacji:
Journal Article; Research Support, Non-U.S. Gov't
Język:
English
Imprint Name(s):
Original Publication: San Francisco, CA : Public Library of Science
MeSH Terms:
Cloud Computing*
Computer Security*
Outsourced Services*
Algorithms ; Models, Theoretical ; Probability ; Time Factors
References:
ScientificWorldJournal. 2014;2014:269357. (PMID: 25121114)
Entry Date(s):
Date Created: 20201105 Date Completed: 20201222 Latest Revision: 20201222
Update Code:
20240105
PubMed Central ID:
PMC7643952
DOI:
10.1371/journal.pone.0241236
PMID:
33151960
Czasopismo naukowe
Data Integrity Auditing (DIA) is a security service for checking the integrity of data stored in a PCS (Public Cloud Storage), a third-party based storage service. A DIA service is provided by using integrity tags (hereafter referred to tags). This paper proposes a novel tagging method, called Tagging of Outsourced Data (TOD), for generating and verifying tags of files. TOD has a number of unique properties: (i) it supports both public and private verifiability, and achieves this property with a low level of overhead at the user end, making it particularly attractive to mobile users with resource-constrained devices, (ii) it protects data confidentiality, supports dynamic tags and is resilient against tag forgery and tag tampering (i.e. by authorised insiders) at the same time in more secure and efficient, making the method more suited to the PCS environment, (iii) it supports tags deduplication, making it more efficient, particularly for the user who has many files with data redundancy. Comprehensive security analysis and performance evaluation have been conducted to demonstrate the efficacy and efficiency of the approach taken in the design.
Competing Interests: The authors have declared that no competing interests exist.
Zaloguj się, aby uzyskać dostęp do pełnego tekstu.

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies