[go: up one dir, main page]

Küpçü, 2015 - Google Patents

Official arbitration with secure cloud storage application

Küpçü, 2015

View PDF
Document ID
6638290652803714999
Author
Küpçü A
Publication year
Publication venue
The Computer Journal

External Links

Snippet

In a secure cloud storage setting, a client outsources storage of her data to a server, who may, willingly or not, corrupt the data, or delete infrequently accessed parts to save space. Existing proof of storage schemes only solve part of this problem: The client may obtain a …
Continue reading at eprint.iacr.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party

Similar Documents

Publication Publication Date Title
CN108418689B (en) Zero-knowledge proof method and medium suitable for block chain privacy protection
US10547643B2 (en) Systems and methods for distributed data sharing with asynchronous third-party attestation
Ruffing et al. P2P mixing and unlinkable bitcoin transactions
Damgård et al. Balancing privacy and accountability in blockchain identity management
Wei et al. Security and privacy for storage and computation in cloud computing
Liu et al. Blockchain-cloud transparent data marketing: Consortium management and fairness
US8978118B2 (en) Pseudonymized authentication
Wei et al. SecCloud: Bridging secure storage and computation in cloud
Camenisch et al. Endorsed e-cash
Au et al. Constant-size dynamic k-times anonymous authentication
Küpçü Official arbitration with secure cloud storage application
Androulaki et al. Hiding transaction amounts and balances in bitcoin
Camenisch et al. An identity escrow scheme with appointed verifiers
US20040221158A1 (en) Digital signature and verification system for conversational messages
Baudet et al. Zef: low-latency, scalable, private payments
Huang et al. P2ofe: privacy-preserving optimistic fair exchange of digital signatures
Tewari et al. Fully anonymous transferable ecash
Alper et al. Optimally efficient multi-party fair exchange and fair secure multi-party computation
Mateu et al. Constructing credential-based E-voting systems from offline E-coin protocols
Desmoulins et al. Direct anonymous attestations with dependent basename opening
Shao-hui et al. Public auditing for ensuring cloud data storage security with zero knowledge Privacy
Persiano et al. A secure and private system for subscription-based remote services
Onieva et al. Intermediary non-repudiation protocols
Abadi et al. Recurring contingent payment for proofs of retrievability
Abraham et al. A survey on optimistic fair digital signature exchange protocols