scholarly journals Dynamic provable data possession

Author(s):  
Chris Erway ◽  
Alptekin Küpçü ◽  
Charalampos Papamanthou ◽  
Roberto Tamassia
2018 ◽  
Vol 11 (1) ◽  
pp. 90
Author(s):  
Sara Alomari ◽  
Mona Alghamdi ◽  
Fahd S. Alotaibi

The auditing services of the outsourced data, especially big data, have been an active research area recently. Many schemes of remotely data auditing (RDA) have been proposed. Both categories of RDA, which are Provable Data Possession (PDP) and Proof of Retrievability (PoR), mostly represent the core schemes for most researchers to derive new schemes that support additional capabilities such as batch and dynamic auditing. In this paper, we choose the most popular PDP schemes to be investigated due to the existence of many PDP techniques which are further improved to achieve efficient integrity verification. We firstly review the work of literature to form the required knowledge about the auditing services and related schemes. Secondly, we specify a methodology to be adhered to attain the research goals. Then, we define each selected PDP scheme and the auditing properties to be used to compare between the chosen schemes. Therefore, we decide, if possible, which scheme is optimal in handling big data auditing.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Fei Tang ◽  
Zhuo Feng ◽  
Qianhong Gong ◽  
Yonghong Huang ◽  
Dong Huang

Group signature can provide the privacy-preserving authentication mechanism for the blockchain. In the traditional blockchain privacy-preserving scheme based on the group signature, there is only one group manager to revoke the anonymity. Thus, the traditional scheme will have single point of failure and key escrow problems. To solve these problems, we propose a privacy-preserving scheme in the blockchain based on the group signature with multiple managers. Our scheme is constructed based on bilinear pairing and the technique of distributed key generation. Finally, we analyze the application of the proposed scheme in the field of blockchain-based provable data possession (PDP), as well as the correctness and security of the scheme.


2017 ◽  
Vol 54 ◽  
pp. 46-54 ◽  
Author(s):  
Liang Xue ◽  
Jianbing Ni ◽  
Yannan Li ◽  
Jian Shen

Author(s):  
Huaqun Wang ◽  
Debiao He ◽  
Anmin Fu ◽  
Qi Li ◽  
Qihua Wang

2019 ◽  
Vol 95 ◽  
pp. 309-322 ◽  
Author(s):  
Wei Guo ◽  
Hua Zhang ◽  
Sujuan Qin ◽  
Fei Gao ◽  
Zhengping Jin ◽  
...  

2020 ◽  
Vol 51 ◽  
pp. 102454
Author(s):  
Reyhaneh Rabaninejad ◽  
Mahmoud Ahmadian Attari ◽  
Maryam Rajabzadeh Asaar ◽  
Mohammad Reza Aref

Sign in / Sign up

Export Citation Format

Share Document