Küpçü, 2015 - Google Patents
Official arbitration with secure cloud storage applicationKüpçü, 2015
View PDF- Document ID
- 6638290652803714999
- Author
- Küpçü A
- Publication year
- Publication venue
- The Computer Journal
External Links
Snippet
In a secure cloud storage setting, a client outsources storage of her data to a server, who may, willingly or not, corrupt the data, or delete infrequently accessed parts to save space. Existing proof of storage schemes only solve part of this problem: The client may obtain a …
- 230000003068 static 0 abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN108418689B (en) | Zero-knowledge proof method and medium suitable for block chain privacy protection | |
| US10547643B2 (en) | Systems and methods for distributed data sharing with asynchronous third-party attestation | |
| Ruffing et al. | P2P mixing and unlinkable bitcoin transactions | |
| Damgård et al. | Balancing privacy and accountability in blockchain identity management | |
| Wei et al. | Security and privacy for storage and computation in cloud computing | |
| Liu et al. | Blockchain-cloud transparent data marketing: Consortium management and fairness | |
| US8978118B2 (en) | Pseudonymized authentication | |
| Wei et al. | SecCloud: Bridging secure storage and computation in cloud | |
| Camenisch et al. | Endorsed e-cash | |
| Au et al. | Constant-size dynamic k-times anonymous authentication | |
| Küpçü | Official arbitration with secure cloud storage application | |
| Androulaki et al. | Hiding transaction amounts and balances in bitcoin | |
| Camenisch et al. | An identity escrow scheme with appointed verifiers | |
| US20040221158A1 (en) | Digital signature and verification system for conversational messages | |
| Baudet et al. | Zef: low-latency, scalable, private payments | |
| Huang et al. | P2ofe: privacy-preserving optimistic fair exchange of digital signatures | |
| Tewari et al. | Fully anonymous transferable ecash | |
| Alper et al. | Optimally efficient multi-party fair exchange and fair secure multi-party computation | |
| Mateu et al. | Constructing credential-based E-voting systems from offline E-coin protocols | |
| Desmoulins et al. | Direct anonymous attestations with dependent basename opening | |
| Shao-hui et al. | Public auditing for ensuring cloud data storage security with zero knowledge Privacy | |
| Persiano et al. | A secure and private system for subscription-based remote services | |
| Onieva et al. | Intermediary non-repudiation protocols | |
| Abadi et al. | Recurring contingent payment for proofs of retrievability | |
| Abraham et al. | A survey on optimistic fair digital signature exchange protocols |