Data possession with outsourced data transfer

被引:0
|
作者
Suraj, M. Naga [1 ]
Ariyamala, Ms. [1 ]
机构
[1] Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, India
来源
Test Engineering and Management | 2019年 / 81卷 / 11-12期
关键词
Network security - Public key cryptography - Cloud computing;
D O I
暂无
中图分类号
学科分类号
摘要
On rapid improvement of cloud computing, large enterprises would like to update and reserve data in the public cloud. Where business parts of organization are brought by other owner, similar data would sent to required system. In normal, computation cost of data sent to the cloud. The process for study data importance with outcome data sending. First time, novel concept, by taking utilization of DTPDP, the accompanying three security prerequisites can be satisfied other un-obtained information security of gained endeavour can be guaranteed the acquired information trustworthiness and protection can be guaranteed the information transferability's calculation can be redistributed to the general population cloud servers. For the security idea of DT-PDP, we give its inspiration, framework model and security model. At that point, we plan a solid DT-PDP conspire dependent on the bilinear pairings. © 2020 Mattingley Publishing. All rights reserved.
引用
收藏
页码:5399 / 5401
相关论文
共 50 条
  • [1] Provable Data Possession with Outsourced Data Transfer
    Wang, Huaqun
    He, Debiao
    Fu, Anmin
    Li, Qi
    Wang, Qihua
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (06) : 1929 - 1939
  • [2] DBT-PDP: Provable data possession with outsourced data batch transfer based on blockchain
    Yi, Chengming
    Zhang, Hua
    Sun, Weiming
    Ding, Jun
    HIGH-CONFIDENCE COMPUTING, 2024, 4 (02):
  • [3] Improved Outsourced Provable Data Possession for Secure Cloud Storage
    Yang, Haibin
    Yi, Zhengge
    Li, Ruifeng
    Tu, Zheng
    Wang, Xu An
    Cui, Yuanyou
    Yang, Xiaoyuan
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [4] Provable Data Possession Scheme with Constant Proof Size for Outsourced Data in Public Cloud
    Purushothama, B. R.
    Amberker, B. B.
    2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2013, : 1662 - 1667
  • [5] Beyond Proofs of Data Possession: Finding Defective Blocks in Outsourced Storage
    Corena, Juan Camilo
    Basu, Anirban
    Kiyomoto, Shinsaku
    Miyake, Yutaka
    Ohtsuki, Tomoaki
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 2381 - 2386
  • [6] Outsourced dynamic provable data possession with batch update for secure cloud storage
    Guo, Wei
    Zhang, Hua
    Qin, Sujuan
    Gao, Fei
    Jin, Zhengping
    Li, Wenmin
    Wen, Qiaoyan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 95 : 309 - 322
  • [7] Provable Data Possession Supporting Secure Data Transfer for Cloud Storage
    Yu, Yong
    Ni, Jianbing
    Yu, Yong
    Wu, Wei
    Wang, Yilei
    2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015), 2015, : 38 - 42
  • [8] Provable data transfer from provable data possession and deletion in cloud storage
    Xue, Liang
    Ni, Jianbing
    Li, Yannan
    Shen, Jian
    COMPUTER STANDARDS & INTERFACES, 2017, 54 : 46 - 54
  • [9] Privacy of Outsourced Data
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    PRIVACY AND IDENTITY MANAGEMENT FOR LIFE, 2010, 320 : 174 - 187
  • [10] Secure Outsourced Data Transfer with Integrity Verification in Cloud Storage
    Ni, Jianbing
    Lin, Xiaodong
    Zhang, Kuan
    Yu, Yong
    Shen, Xuemin
    2016 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2016,