2 research outputs found

    Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing

    No full text
    Cloud storage, one of the core services of cloud computing, provides an effective way to solve the problems of storage and management caused by high-speed data growth. Thus, a growing number of organizations and individuals tend to store their data in the cloud. However, due to the separation of data ownership and management, it is difficult for users to check the integrity of data in the traditional way. Therefore, many researchers focus on developing several protocols, which can remotely check the integrity of data in the cloud. In this paper, we propose a novel public auditing protocol based on the adjacency-hash table, where dynamic auditing and data updating are more efficient than those of the state of the arts. Moreover, with such an authentication structure, computation and communication costs can be reduced effectively. The security analysis and performance evaluation based on comprehensive experiments demonstrate that our protocol can achieve all the desired properties and outperform the state-of-the-art ones in computing overheads for updating and verification

    Some Weaknesses on Adjacency-Hash Table Based Public Auditing for Data Integrity in Mobile Cloud Computing

    No full text
    [[abstract]]The public dynamic auditing protocol help the user or the trusted third party to audit whether or not the cloud service provider stores the upload files correctly. Chen et al. proposed their Adjacency–Hash-Table Based Public dynamic auditing protocol. However, their protocol suffers some weakness under replacing attack. To overcome the weaknesses, some countermeasures are proposed.[[notice]]補正完
    corecore