Computer Applications and Software, Volume. 42, Issue 4, 335(2025)
FLEXIBLE CLOUD AUDITING SCHEME WITH A DESIGNATED VERIFIER
[1] [1] Yu Y, Zhang Y F, Ni J B, et al. Remote data possession checking with enhanced security for cloud[J]. Future Generation Computer Systems, 2015, 52: 77-85.
[2] [2] Schacham H, Waters B. Compact proofs of retrievability[J]. Journal of Cryptology, 2013, 26: 442-483.
[3] [3] Chang J Y, Shao B L, Ji Y, et al. Efficient identity-based provable multi-copy data possession in multi-cloud storage, revisited[J]. IEEE Communications Letters, 2020, 24(12): 2723-2727.
[4] [4] Xue J T, Xu C X, Zhao J N, et al. Identity-based public auditing for cloud storage systems against malicious auditors via blockchain[J]. Science China Information Sciences, 2019, 62: 32104.
[5] [5] Zhang R, Ma H, Lu Y, et al. Provably secure cloud storage for mobile networks with less computation and smaller overhead[J]. Science China Information Sciences, 2017, 60 (12): 122104.
[6] [6] Ji Y, Shao B L, Chang J Y, Bian G Q. Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited[J]. Applied Mathematics and Computation, 2020, 386: 125478.
[7] [7] Tian H, Nan F L, Chang C, et al. Privacy-preserving public auditing for secure data storage in fog-to-cloud computing[J]. Journal of Network and Computer Applications, 2019, 127: 59-69.
[8] [8] Zhang J, Yang Y, Chen Y J. A general framework to design secure cloud storage protocol using homomorphic encryption scheme[J]. Computer Networks, 2017, 129: 37-50.
[9] [9] Gan Q, Wang X M, Fang X F. Efficient and secure auditing scheme for outsourced big data with dynamicity in cloud[J]. Science China Information Sciences, 2018, 61(12): 122104.
[10] [10] Li J G, Yan H, Zhang Y C. Efficient identity-based provable multi-copy data possession in multi-cloud storage[J]. IEEE Transactions on Cloud Computing, 2020, 10(1): 356-365.
[11] [11] Ren Y J, Xu J, Wang J, et al. Designated-verifier provable data possession in public cloud storage[J]. International Journal of Security and its Applications, 2013, 7(6): 11-20.
[12] [12] Wang H Q, He D B, Yu J, et al. Incentive and Unconditionally anonymous identity-based public provable data possession[J]. IEEE Transactions on Services Computing, 2019, 12(5): 824-835.
[13] [13] Yan H, Li J G, Zhang Y C. Remote data checking with a designated verifier in cloud storage[J]. IEEE Systems Journal, 2020, 14(2): 1788-1797.
[14] [14] Wang H Q, Wu Q H, Qin B. Identity-based remote data possession checking in public clouds[J]. IET Information Security, 2014, 8(2): 114-121.
[15] [15] Chen F, Xiang T, Yang Y, et al. Secure cloud storage meets with secure network coding[J]. IEEE Transactions on Computers, 2016, 65(6): 1936-1948.
Get Citation
Copy Citation Text
Zhao Jutao, Chang Jinyong. FLEXIBLE CLOUD AUDITING SCHEME WITH A DESIGNATED VERIFIER[J]. Computer Applications and Software, 2025, 42(4): 335
Category:
Received: Oct. 28, 2021
Accepted: Aug. 25, 2025
Published Online: Aug. 25, 2025
The Author Email: