Blockchain-based publicly verifiable data deletion scheme for cloud storage
Top Cited Papers
- 1 February 2018
- journal article
- research article
- Published by Elsevier BV in Journal of Network and Computer Applications
- Vol. 103, 185-193
- https://doi.org/10.1016/j.jnca.2017.11.011
Abstract
No abstract availableKeywords
Funding Information
- National Natural Science Foundation of China (61572382, 61772405, 61702401)
- China 111 Project (B16037)
- Natural Science Basic Research Plan in Shaanxi Province of China (2016JZ021)
This publication has 28 references indexed in Scilit:
- New Algorithms for Secure Outsourcing of Modular ExponentiationsIEEE Transactions on Parallel and Distributed Systems, 2013
- A survey of confidential data storage and deletion methodsACM Computing Surveys, 2010
- Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud ComputingCommunications in Computer and Information Science, 2010
- Secure Code Update for Embedded Devices via Proofs of Secure ErasureLecture Notes in Computer Science, 2010
- FADE: Secure Overlay Cloud Storage with File Assured DeletionPublished by Springer Science and Business Media LLC ,2010
- Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utilityFuture Generation Computer Systems, 2009
- Overwriting Hard Drive Data: The Great Wiping ControversyLecture Notes in Computer Science, 2008
- Ext3cow: a time-shifting file system for regulatory complianceACM Transactions on Storage, 2005
- Remembrance of data passed: a study of disk sanitization practicesIEEE Security & Privacy, 2003
- How to time-stamp a digital documentJournal of Cryptology, 1991