Academic literature on the topic 'Outsource Proof Of Retrievability'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Outsource Proof Of Retrievability.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Outsource Proof Of Retrievability"

1

Paterson, Maura B., Douglas R. Stinson, and Jalaj Upadhyay. "Multi-prover proof of retrievability." Journal of Mathematical Cryptology 12, no. 4 (2018): 203–20. http://dx.doi.org/10.1515/jmc-2018-0012.

Full text
Abstract:
Abstract There has been considerable recent interest in “cloud storage” wherein a user asks a server to store a large file. One issue is whether the user can verify that the server is actually storing the file, and typically a challenge-response protocol is employed to convince the user that the file is indeed being stored correctly. The security of these schemes is phrased in terms of an extractor which will recover the file given any “proving algorithm” that has a sufficiently high success probability. This forms the basis of proof-of-retrievability (PoR) systems. In this paper, we study mul
APA, Harvard, Vancouver, ISO, and other styles
2

Yuan, Zhonghao, Jiaojiao Wu, Jianpeng Gong, Yao Liu, Guohua Tian, and Jianfeng Wang. "Blockchain-Based Self-Auditing Scheme with Batch Verification for Decentralized Storage." Wireless Communications and Mobile Computing 2022 (June 26, 2022): 1–13. http://dx.doi.org/10.1155/2022/6998046.

Full text
Abstract:
Data owners outsource their data to remote storage providers without keeping local replicas to save their precious storage resources. However, the ownership and management of data are separated after outsourcing. How to ensure the integrity and recoverability of outsourced data becomes a significant problem. Provable Data Possession (PDP) and Proofs of Retrievability (POR) are two cryptographic protocols that enable users to verify the integrity of outsourced data. Nevertheless, the state-of-the-art PDP and POR schemes either need users to perform the complicated audit tasks by themselves or d
APA, Harvard, Vancouver, ISO, and other styles
3

Shubham, Pote1 Vipul Jain2 Rutuja Shinde3 Prasanna Paigude4 Prof.Deepali Ahir 5. "OPOR: PROOF OF RETRIEVABILITY IN CLOUD COMPUTING WITH RECOVERY AND REMOTE INTEGRITY CHECK." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 6 (2017): 58–65. https://doi.org/10.5281/zenodo.802818.

Full text
Abstract:
Cloud computing is popular ,and adopted because there is many security and privacy. A issue found in cloud storage is, when client out-source data to the cloud storage, the clients don’t know that their data is damaged or not. Also the computational burden is too high. To tackle the issue, OPoR, another distributed storage method including a distributed storage server (DSS) and a TPA is proposed here. TPA is thought to be semi-legitimate. Specifically, we consider the assignment of permitting the TPA for the cloud clients, to pre-process the information before transferring to the DSS and later
APA, Harvard, Vancouver, ISO, and other styles
4

Alomari, Sara, Mona Alghamdi, and Fahd S. Alotaibi. "Enhancing Big Data Auditing." Computer and Information Science 11, no. 1 (2018): 90. http://dx.doi.org/10.5539/cis.v11n1p90.

Full text
Abstract:
The auditing services of the outsourced data, especially big data, have been an active research area recently. Many schemes of remotely data auditing (RDA) have been proposed. Both categories of RDA, which are Provable Data Possession (PDP) and Proof of Retrievability (PoR), mostly represent the core schemes for most researchers to derive new schemes that support additional capabilities such as batch and dynamic auditing. In this paper, we choose the most popular PDP schemes to be investigated due to the existence of many PDP techniques which are further improved to achieve efficient integrity
APA, Harvard, Vancouver, ISO, and other styles
5

Rao, Lu, Tengfei Tu, Hua Zhang, Qiaoyan Wen, and Jia Xiao. "Dynamic Outsourced Proofs of Retrievability Enabling Auditing Migration for Remote Storage Security." Wireless Communications and Mobile Computing 2018 (2018): 1–19. http://dx.doi.org/10.1155/2018/4186243.

Full text
Abstract:
Remote data auditing service is important for mobile clients to guarantee the intactness of their outsourced data stored at cloud side. To relieve mobile client from the nonnegligible burden incurred by performing the frequent data auditing, more and more literatures propose that the execution of such data auditing should be migrated from mobile client to third-party auditor (TPA). However, existing public auditing schemes always assume that TPA is reliable, which is the potential risk for outsourced data security. Although Outsourced Proofs of Retrievability (OPOR) have been proposed to furth
APA, Harvard, Vancouver, ISO, and other styles
6

Ren, Yan, Haipeng Guan, Qiuxia Zhao, and Zongxiang Yi. "Blockchain-Based Proof of Retrievability Scheme." Security and Communication Networks 2022 (February 3, 2022): 1–8. http://dx.doi.org/10.1155/2022/3186112.

Full text
Abstract:
In the internet of things, user information is usually collected by all kinds of smart devices. The collected user information is stored in the cloud storage, and there is a risk of information leakage. In order to protect the security and the privacy of user information, the user and cloud provider will periodically execute a protocol called proof of retrievability scheme. A proof of retrievability scheme ensures the security of the data by generating proof to convince the user that the cloud provider does correctly store the user information. In this paper, we construct a proof of retrievabi
APA, Harvard, Vancouver, ISO, and other styles
7

Dumas, Jean-Guillaume, Aude Maignan, Clément Pernet, and Daniel S. Roche. "VESPo: Verified Evaluation of Secret Polynomials (with application to dynamic proofs of retrievability)." Proceedings on Privacy Enhancing Technologies 2023, no. 3 (2023): 354–74. http://dx.doi.org/10.56553/popets-2023-0085.

Full text
Abstract:
Proofs of Retrievability are protocols which allow a Client to store data remotely and to efficiently ensure, via audits, that the entirety of that data is still intact. Dynamic Proofs of Retrievability (DPoR) also support efficient retrieval and update of any small portion of the data. We propose a novel protocol for arbitrary outsourced data storage that achieves both low remote storage size and audit complexity. A key ingredient, that can be also of intrinsic interest, reduces to efficiently evaluating a secret polynomial at given public points, when the (encrypted) polynomial is stored on
APA, Harvard, Vancouver, ISO, and other styles
8

Shao, Zhi Yi, and Bo Yang. "Proof of retrievability with efficient verification." International Journal of Embedded Systems 7, no. 3/4 (2015): 203. http://dx.doi.org/10.1504/ijes.2015.072365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Liming, and Dexin Yang. "A novel zero knowledge proof of retrievability." International Journal of Autonomous and Adaptive Communications Systems 13, no. 1 (2020): 1. http://dx.doi.org/10.1504/ijaacs.2020.10025882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yang, Dexin, and Liming Liu. "A novel zero knowledge proof of retrievability." International Journal of Autonomous and Adaptive Communications Systems 13, no. 1 (2020): 1. http://dx.doi.org/10.1504/ijaacs.2020.104157.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Outsource Proof Of Retrievability"

1

Shines, Frank. New Science of Success: How to Outsource Proof Your Job and Prosper in a Web 2.0 Economy. Skill of Success Publishing, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Outsource Proof Of Retrievability"

1

Omote, Kazumasa, and Tran Phuong Thao. "DD-POR: Dynamic Operations and Direct Repair in Network Coding-Based Proof of Retrievability." In Lecture Notes in Computer Science. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21398-9_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Olakanmi, Oladayo Olufemi, and Adedamola Dada. "An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms." In Research Anthology on Privatizing and Securing Data. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8954-0.ch061.

Full text
Abstract:
In outsourcing computation models, weak devices (clients) increasingly rely on remote servers (workers) for data storage and computations. However, most of these servers are hackable or untrustworthy, which makes their computation questionable. Therefore, there is need for clients to validate the correctness of the results of their outsourced computations and ensure that servers learn nothing about their clients other than the outputs of their computation. In this work, an efficient privacy preservation validation approach is developed which allows clients to store and outsource their computat
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Outsource Proof Of Retrievability"

1

Armknecht, Frederik, Jens-Matthias Bohli, Ghassan O. Karame, Zongren Liu, and Christian A. Reuter. "Outsourced Proofs of Retrievability." In CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2014. http://dx.doi.org/10.1145/2660267.2660310.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Le, Tung, Pengzhi Huang, Attila A. Yavuz, Elaine Shi, and Thang Hoang. "Efficient Dynamic Proof of Retrievability for Cold Storage." In Network and Distributed System Security Symposium. Internet Society, 2023. http://dx.doi.org/10.14722/ndss.2023.23307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chauhan, Nitin Singh, and Ashutosh Saxena. "A robust scheme on proof of data retrievability in cloud." In 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2014. http://dx.doi.org/10.1109/icacci.2014.6968574.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Beng, Tan Choon, Mohd Hanafi Ahmad Hijazi, and Yuto Lim. "Partial binary encoding for Slepian-Wolf Based Proof of Retrievability." In 2017 IEEE 15th Student Conference on Research and Development (SCOReD). IEEE, 2017. http://dx.doi.org/10.1109/scored.2017.8305422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chavan, Nikhil Sushil, and Deepak Sharma. "Secure Proof of Retrievability System in Cloud for Data Integrity." In 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA). IEEE, 2018. http://dx.doi.org/10.1109/iccubea.2018.8697842.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yu, Guangchen, Juan Ma, and Ji Wang. "Proof of Retrievability for Image Data in Industrial Cloud Platform." In CIAT 2020: 2020 International Conference on Cyberspace Innovation of Advanced Technologies. ACM, 2020. http://dx.doi.org/10.1145/3444370.3444622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hiremath, Shivarajkumar, and R. Sanjeev Kunte. "Homomorphic Authentication Scheme for Proof of Retrievability with Public Verifiability." In 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2020. http://dx.doi.org/10.1109/iciccs48265.2020.9120974.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jakhotia, Khushbu, Rohini Bhosale, and Chelpa Lingam. "Novel architecture for enabling proof of retrievability using AES algorithm." In 2017 International Conference on Computing Methodologies and Communication (ICCMC). IEEE, 2017. http://dx.doi.org/10.1109/iccmc.2017.8282715.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Jianhong, and Wenjing Tang. "Public Proof of Retrievability Scheme against Active Attack in Cloud Storage." In 2014 International Conference on Future Computer and Communication Engineering (ICFCCE 2014). Atlantis Press, 2014. http://dx.doi.org/10.2991/icfcce-14.2014.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mo, Zhen, Yian Zhou, and Shigang Chen. "A dynamic Proof of Retrievability (PoR) scheme with O(logn) complexity." In ICC 2012 - 2012 IEEE International Conference on Communications. IEEE, 2012. http://dx.doi.org/10.1109/icc.2012.6364056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!