An efficient and secure identity-based integrity auditing scheme for sensitive data with anti-replacement attack on multi-cloud storage.
Mahender KumarCarsten MapleSatish ChandPublished in: J. King Saud Univ. Comput. Inf. Sci. (2023)
Keyphrases
- sensitive data
- cloud storage
- encrypted data
- ciphertext
- data confidentiality
- encryption scheme
- malicious users
- secret key
- smart card
- standard model
- key distribution
- diffie hellman
- data sharing
- encryption algorithm
- privacy preserving
- data storage
- third party
- authentication protocol
- security analysis
- information security
- sensitive information
- signcryption scheme
- confidential data
- pseudorandom
- data privacy
- data protection
- data access
- data integrity
- data quality
- key management
- cloud computing
- signature scheme
- privacy protection
- database
- public key
- data mining
- databases