Proof of storage with corruption identification and recovery for dynamic group users

The outsourced storage mode of cloud computing leads to the separation of data ownership and management rights of data owners, which changes the data storage network model and security model.To effectively deal with the software and hardware failures of the cloud server and the potential dishonest s...

Full description

Saved in:
Bibliographic Details
Main Authors: Tao JIANG, Hang XU, Liangmin WANG, Jianfeng MA
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2022-10-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022071
Tags: Add Tag
No Tags, Be the first to tag this record!