Data integrity checking protocol based on secure multiparty computation

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we defined a new cloud-oriented model for data integrity checking, in which there were three participants: a data owner, a data checker, and a cloud server, and the data checker could perform the checking procedure with the permission and the help of the data owner. Furthermore, we presented a two-party protocol for secure modular computation (SModC), and then proposed a data integrity checking protocol based on the SModC protocol. Due to its high efficiency and security, the proposed protocol has good application prospects, especially in the fields of cloud computation and big data.

References Powered by Scopus

PROTOCOLS FOR SECURE COMPUTATIONS.

3848Citations
N/AReaders
Get full text

Privacy-preserving public auditing for data storage security in cloud computing

1132Citations
N/AReaders
Get full text

Security and composition of multiparty cryptographic protocols

961Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Shi, R., Zhang, Y., Zhong, H., Cui, J., & Zhang, S. (2016). Data integrity checking protocol based on secure multiparty computation. In Lecture Notes in Electrical Engineering (Vol. 348, pp. 873–882). Springer Verlag. https://doi.org/10.1007/978-81-322-2580-5_79

Readers' Seniority

Tooltip

Professor / Associate Prof. 1

50%

PhD / Post grad / Masters / Doc 1

50%

Readers' Discipline

Tooltip

Computer Science 1

100%

Save time finding and organizing research with Mendeley

Sign up for free