User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 19
Monitoring Data Consistency in Trustworthy Cloud Memory Platforms Using Fuzzy Identities
2022
Journal:  
Turkish Journal of Computer and Mathematics Education
Author:  
Abstract:

Data integrity has been recognised as an important aspect of secure cloud storage. An auditor may quickly and easily verify the correctness of the outsourced data without having to download the data itself, thanks to data auditing protocols. Existing designs of data auditing methods provide a significant research challenge due to the complexity in key management. The purpose of this study is to tackle the intricate Fuzzy identity-based auditing is introduced, solving a significant management difficulty in cloud data integrity verification, and is the first method of its kind. To be more precise, we introduce the foundational concept of fuzzy identity-based data auditing, in which the identity of a user is conceptualised as a collection of descriptors. For this novel primitive, we formally define both the system and security models. Using biometrics as the fuzzy identity, we then demonstrate a practical implementation of an auditing system based on fuzzy identities. To provide error-tolerance, the new protocol associates a private key with one identity and uses that identity to validate the accuracy of a response created with another identity, provided both identities are sufficiently similar. With the use of the computational Diffie-Hellman assumption and the discrete logarithm assumption from the selective-ID security model, we demonstrate the safety of our protocol. At last, we create a working prototype of the protocol to show how our plan might work in practise.

Keywords:

Citation Owners
Information: There is no ciation to this publication.
Similar Articles










Turkish Journal of Computer and Mathematics Education

Journal Type :   Uluslararası

Metrics
Article : 1.706
Cite : 108
2023 Impact : 0.071
Turkish Journal of Computer and Mathematics Education