A survey on blockchain-based integrity auditing for cloud data
Tài liệu tham khảo
Tabrizchi, 2020, A survey on security challenges in cloud computing: issues, threats, and solutions, J. Supercomput., 76, 9493, 10.1007/s11227-020-03213-1
Yang, 2012, Data storage auditing service in cloud computing: challenges, methods and opportunities, World Wide Web, 15, 409, 10.1007/s11280-011-0138-0
Fernandes, 2014, Security issues in cloud environments: a survey, Int. J. Inf. Secur., 13, 113, 10.1007/s10207-013-0208-7
Ghobadi, 2014, Cloud computing, reliability and security issue, 504
Li, 2020, A survey on integrity auditing for data storage in the cloud: from single copy to multiple replicas, IEEE Trans. Big Data, 1
Zhou, 2018, Data integrity verification of the outsourced big data in the cloud environment: a survey, J. Netw. Comput. Appl., 122, 1, 10.1016/j.jnca.2018.08.003
Zafar, 2017, A survey of cloud computing data integrity schemes: design challenges, taxonomy and future trends, Comput. Secur., 65, 29, 10.1016/j.cose.2016.10.006
Sookhak, 2014, A review on remote data auditing in single cloud server: taxonomy and open issues, J. Netw. Comput. Appl., 43, 121, 10.1016/j.jnca.2014.04.011
Hsien, 2016, A survey of public auditing for secure data storage in cloud computing, Int. J. Netw. Secur., 18, 133
Tan, 2018, A survey on proof of retrievability for cloud data integrity and availability: cloud storage state-of-the-art, issues, solutions and future trends, J. Netw. Comput. Appl., 110, 75, 10.1016/j.jnca.2018.03.017
Sookhak, 2015, Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues, ACM Comput. Surv., 47, 1, 10.1145/2764465
Barsoum, 2015, Provable data possession in single cloud server: a survey, classification and comparative study, Int. J. Comput. Appl., 123, 1
Thangavel, 2017, A survey on provable data possession in cloud storage, 25
Dong, 2018, A survey on data integrity checking in cloud, 109
Gangadevi, 2021, A survey on data integrity verification schemes using blockchain technology in cloud computing environment, vol. 1110
Li, 2019, A method for achieving provable data integrity in cloud computing, J. Supercomput., 75, 92, 10.1007/s11227-015-1598-2
Nayak, 2021, Sepdp: secure and efficient privacy preserving provable data possession in cloud storage, IEEE Trans. Serv. Comput., 14, 876, 10.1109/TSC.2018.2820713
Chavan, 2018, Secure proof of retrievability system in cloud for data integrity, 1
Nakamoto
Yu, 2017, Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage, IEEE Trans. Inf. Forensics Secur., 12, 767, 10.1109/TIFS.2016.2615853
Yu, 2018, Blockchain-based solutions to security and privacy issues in the internet of things, IEEE Wireless Commun., 25, 12, 10.1109/MWC.2017.1800116
Yu, 2020, Attribute-based cloud data integrity auditing for secure outsourced storage, IEEE Trans. Emerg. Top. Com., 8, 377, 10.1109/TETC.2017.2759329
Li, 2019, Fuzzy identity-based data integrity auditing for reliable cloud storage systems, IEEE Trans. Depend. Secure., 16, 72, 10.1109/TDSC.2017.2662216
Li, 2020, Integritychain: provable data possession for decentralized storage, IEEE J. Sel. Area. Commun., 38, 1205, 10.1109/JSAC.2020.2986664
Moustapha, 2020, The effect of propagation delay on the dynamic evolution of the bitcoin blockchain, Digit. Commun. Netw., 6, 157, 10.1016/j.dcan.2019.01.006
Wang, 2018, An overview of smart contract: architecture, applications, and future trends, 108
Peng, 2021, Privacy preservation in permissionless blockchain: a survey, Digit. Commun. Netw., 7, 295, 10.1016/j.dcan.2020.05.008
Yan, 2021, Social-chain: decentralized trust evaluation based on blockchain in pervasive social networking, ACM Trans. Internet Technol., 21, 1, 10.1145/3419102
Wu, 2020, Guest editorial: blockchain and healthcare computing, IEEE J. Biomed. Health., 24, 2144, 10.1109/JBHI.2020.3003767
Feng, 2021, Blockchain-based data transmission control for tactical data link, Digit. Commun. Netw., 7, 285, 10.1016/j.dcan.2020.05.007
Maesa, 2020, Blockchain 3.0 applications survey, J. Parallel Distr. Comput., 138, 99, 10.1016/j.jpdc.2019.12.019
Zhang, 2019, Security and privacy on blockchain, ACM Comput. Surv., 52, 1, 10.1145/3316481
Feng, 2019, Mcs-chain: decentralized and trustworthy mobile crowdsourcing based on blockchain, Future Generat. Comput. Syst., 95, 649, 10.1016/j.future.2019.01.036
Liu, 2020, B4sdc: a blockchain system for security data collection in manets, IEEE Trans. Big Data, 7, 5329
Choo, 2020, Blockchain in industrial iot applications: security and privacy advances, challenges, and opportunities, IEEE Trans. Ind. Inf., 16, 4119, 10.1109/TII.2020.2966068
Feng, 2022, Anonymous authentication on trust in blockchain-based mobile crowdsourcing, IEEE Internet Things J., 9, 14185, 10.1109/JIOT.2020.3018878
Zheng, 2018, Blockchain challenges and opportunities: a survey, Int. J. Web Grid Serv., 14, 352, 10.1504/IJWGS.2018.095647
Li, 2017, Consortium blockchain for secure energy trading in industrial internet of things, IEEE Trans. Ind. Inf., 14, 3690
Pahlajani, 2019, Survey on private blockchain consensus algorithms, 1
Yu, 2018, Decentralized big data auditing for smart city environments leveraging blockchain technology, IEEE Access, 7, 6288, 10.1109/ACCESS.2018.2888940
Lamport, 2019, 203
Zhang, 2016, Provable multiple replication data possession with full dynamics for secure cloud storage, Concurrency Comput. Pract. Ex., 28, 1161, 10.1002/cpe.3573
Wang, 2010, Enabling public auditability and data dynamics for storage security in cloud computing, IEEE Trans. Parallel Distr. Syst., 22, 847, 10.1109/TPDS.2010.183
Wang, 2014, Identity-based remote data possession checking in public clouds, IET Inf. Secur., 8, 114, 10.1049/iet-ifs.2012.0271
Zhang, 2004, An efficient signature scheme from bilinear pairings and its applications, 277
Yu, 2015, Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage, Int. J. Inf. Secur., 14, 307, 10.1007/s10207-014-0263-8
Wu, 2020, Special issue on blockchain and communication networks, Digit. Commun. Netw., 6, 145, 10.1016/j.dcan.2020.04.012
Ren, 2012, Security challenges for the public cloud, IEEE Internet Comput., 16, 69, 10.1109/MIC.2012.14
Ryoo, 2013, Cloud security auditing: challenges and emerging approaches, IEEE Secur. Priv., 12, 68, 10.1109/MSP.2013.132
Wang, 2020, Blockchain-based fair payment smart contract for public cloud storage auditing, Inf. Sci., 519, 348, 10.1016/j.ins.2020.01.051
Yue, 2020, Blockchain-based verification framework for data integrity in edge-cloud storage, J. Parallel Distr. Comput., 146, 1, 10.1016/j.jpdc.2020.06.007
Liu, 2017, Blockchain based data integrity service framework for iot data, 468
Li, 2020, Blockchain-based public auditing for big data in cloud storage, Inf. Process. Manag., 57, 10.1016/j.ipm.2020.102382
El Ghazouani, 2019, Blockchain & multi-agent system: a new promising approach for cloud data integrity auditing with deduplication, Int. J. Commun. Network. Inf. Secur., 11, 175
Fan, 2020, Dredas: decentralized, reliable and efficient remote outsourced data auditing scheme with blockchain smart contract for industrial iot, Future Generat. Comput. Syst., 110, 665, 10.1016/j.future.2019.10.014
Huang, 2020, A collaborative auditing blockchain for trustworthy data integrity in cloud storage system, IEEE Access, 8, 94780, 10.1109/ACCESS.2020.2993606
Dong, 2020, A secure iot data integrity auditing scheme based on consortium blockchain, 246
Chen, 2020, Blockchain-based dynamic provable data possession for smart cities, IEEE Internet Things J., 7, 4143, 10.1109/JIOT.2019.2963789
Zhang, 2021, Blockchain-based public integrity verification for cloud storage against procrastinating auditors, IEEE Trans. Cloud Comput., 9, 923, 10.1109/TCC.2019.2908400
Zhao, 2020, Blockchain-based privacy-preserving remote data integrity checking scheme for iot information systems, Inf. Process. Manag., 57, 10.1016/j.ipm.2020.102355
Wang, 2019, Blockchain based data integrity verification for large-scale iot data, IEEE Access, 7, 164996, 10.1109/ACCESS.2019.2952635
Tiwari, 2015, A novel secure cloud storage architecture combining proof of retrievability and revocation, 438