Journal articles on the topic 'Provable data possession (PDP)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Provable data possession (PDP).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Li, Bin, Chen Lei Cao, Jian Yi Liu, and Jin Xia Wei. "A New Delegation Provable Data Possession in Public Cloud Storage." Applied Mechanics and Materials 644-650 (September 2014): 2239–44. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2239.
Full textJayaraman, Indumathi, and Mokhtar Mohammed. "Secure Privacy Conserving Provable Data Possession (SPC-PDP) framework." Information Systems and e-Business Management 18, no. 3 (2019): 351–77. http://dx.doi.org/10.1007/s10257-019-00417-8.
Full textZhou, Fucai, Su Peng, Jian Xu, and Zifeng Xu. "Identity-Based Batch Provable Data Possession with Detailed Analyses." International Journal of Foundations of Computer Science 28, no. 06 (2017): 743–60. http://dx.doi.org/10.1142/s0129054117400160.
Full textZhou, Caixue. "A Certificate-Based Provable Data Possession Scheme in the Standard Model." Security and Communication Networks 2021 (September 2, 2021): 1–12. http://dx.doi.org/10.1155/2021/9974485.
Full textAlomari, Sara, Mona Alghamdi, and Fahd S. Alotaibi. "Enhancing Big Data Auditing." Computer and Information Science 11, no. 1 (2018): 90. http://dx.doi.org/10.5539/cis.v11n1p90.
Full textMathiyalahan, Subasri, Shobana Manivannan, Mahalakshmi Nagasundaram, and R. Ezhilarasie. "Data Integrity Verification Using MPT (Merkle Patricia Tree) in Cloud Computing." International Journal of Engineering & Technology 7, no. 2.24 (2018): 500. http://dx.doi.org/10.14419/ijet.v7i2.24.12146.
Full textYan, Hao, Yanan Liu, Zheng Zhang, and Qian Wang. "Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage." Security and Communication Networks 2021 (May 27, 2021): 1–11. http://dx.doi.org/10.1155/2021/6639634.
Full textRani, R. Santha Maria, and Dr Lata Ragha. "Dynamic Public Data Auditing Schemes on Cloud: A Survey." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 1 (2018): 76. http://dx.doi.org/10.23956/ijarcsse.v8i1.518.
Full textYang, Hanzhe, Ruidan Su, Pei Huang, et al. "PMAB: A Public Mutual Audit Blockchain for Outsourced Data in Cloud Storage." Security and Communication Networks 2021 (June 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/9993855.
Full textTang, Fei, Zhuo Feng, Qianhong Gong, Yonghong Huang, and Dong Huang. "Privacy-Preserving Scheme in the Blockchain Based on Group Signature with Multiple Managers." Security and Communication Networks 2021 (November 24, 2021): 1–8. http://dx.doi.org/10.1155/2021/7094910.
Full textChamoli, Ankit, and Anshika Goyal. "Data Integrity and Performance Comparison of New Type- Based Proxy Re-encryption (TB-PRE) and Provable Data Possession (PDP) in Mobile Cloud Computing." International Journal of Computer Sciences and Engineering 6, no. 5 (2018): 1123–28. http://dx.doi.org/10.26438/ijcse/v6i5.11231128.
Full textYuan, Zhonghao, Jiaojiao Wu, Jianpeng Gong, Yao Liu, Guohua Tian, and Jianfeng Wang. "Blockchain-Based Self-Auditing Scheme with Batch Verification for Decentralized Storage." Wireless Communications and Mobile Computing 2022 (June 26, 2022): 1–13. http://dx.doi.org/10.1155/2022/6998046.
Full textDeng, Zuojie, and Jingli Zhou. "P3DP: privacy preserving provable data possession with multi-copy and data dynamics in a cloud storage." Journal of Intelligent & Fuzzy Systems 31, no. 2 (2016): 1065–78. http://dx.doi.org/10.3233/jifs-169035.
Full textErway, C. Chris, Alptekin Küpçü, Charalampos Papamanthou, and Roberto Tamassia. "Dynamic Provable Data Possession." ACM Transactions on Information and System Security 17, no. 4 (2015): 1–29. http://dx.doi.org/10.1145/2699909.
Full textWang, Yujue, Qianhong Wu, Bo Qin, Shaohua Tang, and Willy Susilo. "Online/Offline Provable Data Possession." IEEE Transactions on Information Forensics and Security 12, no. 5 (2017): 1182–94. http://dx.doi.org/10.1109/tifs.2017.2656461.
Full textShuang, Tan, Jian Feng Zhang, and Zhi Kun Chen. "Provable Data Possession in Cloud Computing." Applied Mechanics and Materials 513-517 (February 2014): 1406–13. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1406.
Full textYi, Mingxu, Lifeng Wang, and Jinxia Wei. "Distributed data possession provable in cloud." Distributed and Parallel Databases 35, no. 1 (2016): 1–21. http://dx.doi.org/10.1007/s10619-016-7190-9.
Full textAteniese, Giuseppe, Randal Burns, Reza Curtmola, et al. "Remote data checking using provable data possession." ACM Transactions on Information and System Security 14, no. 1 (2011): 1–34. http://dx.doi.org/10.1145/1952982.1952994.
Full textXue, Liang, Jianbing Ni, Yannan Li, and Jian Shen. "Provable data transfer from provable data possession and deletion in cloud storage." Computer Standards & Interfaces 54 (November 2017): 46–54. http://dx.doi.org/10.1016/j.csi.2016.08.006.
Full textZhou, Caixue, Lihua Wang, and Lingmin Wang. "Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems." International Journal of Distributed Sensor Networks 18, no. 4 (2022): 155013292210929. http://dx.doi.org/10.1177/15501329221092940.
Full textChen, Lan-xiang. "A Homomorphic Hashing Based Provable Data Possession." Journal of Electronics & Information Technology 33, no. 9 (2011): 2199–204. http://dx.doi.org/10.3724/sp.j.1146.2011.00001.
Full textWang, Huaqun. "Proxy Provable Data Possession in Public Clouds." IEEE Transactions on Services Computing 6, no. 4 (2013): 551–59. http://dx.doi.org/10.1109/tsc.2012.35.
Full textLi, Yannan, Yong Yu, Ruonan Chen, Xiaojiang Du, and Mohsen Guizani. "IntegrityChain: Provable Data Possession for Decentralized Storage." IEEE Journal on Selected Areas in Communications 38, no. 6 (2020): 1205–17. http://dx.doi.org/10.1109/jsac.2020.2986664.
Full textLiu, Yudong, Shuai Xiao, Han Wang, and Xu An Wang. "New provable data transfer from provable data possession and deletion for secure cloud storage." International Journal of Distributed Sensor Networks 15, no. 4 (2019): 155014771984249. http://dx.doi.org/10.1177/1550147719842493.
Full textLi, Ming Chu, Liang Zhang, and Cheng Guo. "Accurate Location in Batch Dynamic Provable Data Possession." Applied Mechanics and Materials 519-520 (February 2014): 9–12. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.9.
Full textPeng, Su, Fucai Zhou, Qiang Wang, Zifeng Xu, and Jian Xu. "Identity-Based Public Multi-Replica Provable Data Possession." IEEE Access 5 (2017): 26990–7001. http://dx.doi.org/10.1109/access.2017.2776275.
Full textLi, Chaoling, Yue Chen, Pengxu Tan, and Gang Yang. "Towards comprehensive provable data possession in cloud computing." Wuhan University Journal of Natural Sciences 18, no. 3 (2013): 265–71. http://dx.doi.org/10.1007/s11859-013-0926-8.
Full textYang, Haibin, Zhengge Yi, Ruifeng Li, et al. "Improved Outsourced Provable Data Possession for Secure Cloud Storage." Security and Communication Networks 2021 (July 22, 2021): 1–12. http://dx.doi.org/10.1155/2021/1805615.
Full textRen, Yongjun, Jiang Xu, Jin Wang, and Jeong-Uk Kim. "Designated-Verifier Provable Data Possession in Public Cloud Storage." International Journal of Security and Its Applications 7, no. 6 (2013): 11–20. http://dx.doi.org/10.14257/ijsia.2013.7.6.02.
Full textBarsoum, Ayad F., and M. Anwar Hasan. "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems." IEEE Transactions on Information Forensics and Security 10, no. 3 (2015): 485–97. http://dx.doi.org/10.1109/tifs.2014.2384391.
Full textWang, Huaqun. "Identity-Based Distributed Provable Data Possession in Multicloud Storage." IEEE Transactions on Services Computing 8, no. 2 (2015): 328–40. http://dx.doi.org/10.1109/tsc.2014.1.
Full textRen, Yongjun, Jiang Xu, Jin Wang, and Jeong-Uk Kim. "Server Re-Tag Provable Data Possession in Public Cloud." International Journal of Hybrid Information Technology 6, no. 6 (2013): 301–10. http://dx.doi.org/10.14257/ijhit.2013.6.6.27.
Full textChen, Ruonan, Yannan Li, Yong Yu, Huilin Li, Xiaofeng Chen, and Willy Susilo. "Blockchain-Based Dynamic Provable Data Possession for Smart Cities." IEEE Internet of Things Journal 7, no. 5 (2020): 4143–54. http://dx.doi.org/10.1109/jiot.2019.2963789.
Full textTian, Junfeng, Guo Ruifang, and Xuan Jing. "Stern–Brocot-Based Non-Repudiation Dynamic Provable Data Possession." IEEE Access 7 (2019): 96686–94. http://dx.doi.org/10.1109/access.2019.2916173.
Full textChen, Liang, Lansheng Han, Jiandu Jing, and Dongping Hu. "A post-quantum provable data possession protocol in cloud." Security and Communication Networks 6, no. 5 (2013): 658–67. http://dx.doi.org/10.1002/sec.691.
Full textLi, Zhengwen, Yang Xin, De Zhao, and Yixian Yang. "A Noninteractive Multireplica Provable Data Possession Scheme Based on Smart Contract." Security and Communication Networks 2022 (April 6, 2022): 1–14. http://dx.doi.org/10.1155/2022/6268449.
Full textYANG, Jian, Jian WANG, Haihang WANG, and Dengqi YANG. "Agent-based provable data possession scheme for mobile cloud computing." Journal of Computer Applications 33, no. 3 (2013): 743–47. http://dx.doi.org/10.3724/sp.j.1087.2013.00743.
Full textLi, Tian, Huaqun Wang, Debiao He, and Jia Yu. "Synchronized Provable Data Possession Based on Blockchain for Digital Twin." IEEE Transactions on Information Forensics and Security 17 (2022): 472–85. http://dx.doi.org/10.1109/tifs.2022.3144869.
Full textA. Abinaya and K. Fathima Bibi. "Identity Based Distributed Provable Data Possession in Multi Cloud Storage." International Journal of Computer Sciences and Engineering 5, no. 8 (2017): 17–21. http://dx.doi.org/10.26438/ijcse/v5i8.1721.
Full textYuan, Yilin, Jianbiao Zhang, and Wanshan Xu. "Dynamic Multiple-Replica Provable Data Possession in Cloud Storage System." IEEE Access 8 (2020): 120778–84. http://dx.doi.org/10.1109/access.2020.3006278.
Full textZhang, Yihua, and Marina Blanton. "Efficient Dynamic Provable Possession of Remote Data via Update Trees." ACM Transactions on Storage 12, no. 2 (2016): 1–45. http://dx.doi.org/10.1145/2747877.
Full textWang, Huaqun, Debiao He, Jia Yu, and Zhiwei Wang. "Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession." IEEE Transactions on Services Computing 12, no. 5 (2019): 824–35. http://dx.doi.org/10.1109/tsc.2016.2633260.
Full textZhu, Yan, Hongxin Hu, Gail-Joon Ahn, and Mengyang Yu. "Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage." IEEE Transactions on Parallel and Distributed Systems 23, no. 12 (2012): 2231–44. http://dx.doi.org/10.1109/tpds.2012.66.
Full textRen, Zhengwei, Lina Wang, Ruyi Deng, and Rongwei Yu. "Improved fair and dynamic provable data possession supporting public verification." Wuhan University Journal of Natural Sciences 18, no. 4 (2013): 348–54. http://dx.doi.org/10.1007/s11859-013-0941-9.
Full textLuo, Wen Jun, and Lu Liu. "Multi-Replica Dynamic Data Verification for Cloud Computing." Applied Mechanics and Materials 263-266 (December 2012): 2939–44. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2939.
Full textQi, Yining, Zhen Yang, Yubo Luo, Yongfeng Huang, and Xing Li. "Blockchain-Based Light-Weighted Provable Data Possession for Low Performance Devices." Computers, Materials & Continua 73, no. 2 (2022): 2205–21. http://dx.doi.org/10.32604/cmc.2022.027939.
Full textChaudhari, Smita, and Gandharba Swain. "Towards Lightweight Provable Data Possession for Cloud Storage Using Indistinguishability Obfuscation." IEEE Access 10 (2022): 31607–25. http://dx.doi.org/10.1109/access.2022.3159699.
Full textZha, Yaxing, Shoushan Luo, Jianchao Bian, and Wei Li. "A novel provable data possession scheme based on geographic location attribute." China Communications 13, no. 9 (2016): 139–50. http://dx.doi.org/10.1109/cc.2016.7582306.
Full textPeng, Su, Fucai Zhou, Jian Xu, and Zifeng Xu. "Comments on “Identity-Based Distributed Provable Data Possession in Multicloud Storage”." IEEE Transactions on Services Computing 9, no. 6 (2016): 996–98. http://dx.doi.org/10.1109/tsc.2016.2589248.
Full textLiu, Meng, Xuyun Zhang, Chi Yang, Qiang He, and Jianbing Zhang. "Curve fitting based efficient parameter selection for robust provable data possession." Journal of Parallel and Distributed Computing 120 (October 2018): 62–76. http://dx.doi.org/10.1016/j.jpdc.2018.05.007.
Full text