Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1)
  • Open Access

    ARTICLE

    Implementation of ID-based Audit Protocols to Enhance Security and Productivity

    R. Hariharan1,*, G. Komarasamy2, S. Daniel Madan Raja3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 873-882, 2023, DOI:10.32604/csse.2023.029899

    Abstract Cloud storage has gained increasing popularity, as it helps cloud users arbitrarily store and access the related outsourced data. Numerous public audit buildings have been presented to ensure data transparency. However, modern developments have mostly been constructed on the public key infrastructure. To achieve data integrity, the auditor must first authenticate the legality of the public key certificate, which adds to an immense workload for the auditor, in order to ensure that data integrity is accomplished. The data facilities anticipate that the storage data quality should be regularly tracked to minimize disruption to the saved data in order to maintain… More >

Displaying 1-10 on page 1 of 1. Per Page