Cited 0 time in
An efficient provable data possession scheme based on counting bloom filter for dynamic data in the cloud storage
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Jung, E. | - |
| dc.contributor.author | Jeong, J. | - |
| dc.date.accessioned | 2024-08-08T04:00:56Z | - |
| dc.date.available | 2024-08-08T04:00:56Z | - |
| dc.date.issued | 2016 | - |
| dc.identifier.issn | 1975-0080 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/17426 | - |
| dc.description.abstract | Cloud services have become a trend, because many companies are supplying various cloud services that reflect the needs of users. However, as cloud services increase, security problems, such as saved data spills and data modulation, also increase. This paper focuses on the problem of data integrity. A PDP (Provable Data Possession) scheme has the disadvantage of time overheads, because dynamic data needs additional processing time. To solve the problem, this paper examines the use of a Counting Bloom Filter for updating data. This technique is more efficient than using PDP when changing part of the data in a simulation. The result is more effective if the saved data changes part of the dynamic data. © 2016 SERSC. | - |
| dc.format.extent | 8 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Science and Engineering Research Support Society | - |
| dc.title | An efficient provable data possession scheme based on counting bloom filter for dynamic data in the cloud storage | - |
| dc.type | Article | - |
| dc.publisher.location | 대한민국 | - |
| dc.identifier.doi | 10.14257/ijmue.2016.11.4.02 | - |
| dc.identifier.scopusid | 2-s2.0-84964519957 | - |
| dc.identifier.bibliographicCitation | International Journal of Multimedia and Ubiquitous Engineering, v.11, no.4, pp 9 - 16 | - |
| dc.citation.title | International Journal of Multimedia and Ubiquitous Engineering | - |
| dc.citation.volume | 11 | - |
| dc.citation.number | 4 | - |
| dc.citation.startPage | 9 | - |
| dc.citation.endPage | 16 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.subject.keywordAuthor | Cloud computing security | - |
| dc.subject.keywordAuthor | Data integrity | - |
| dc.subject.keywordAuthor | Provable data possession | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
